Sciweavers

1268 search results - page 126 / 254
» One Logic to Use Them All
Sort
View
ESAS
2004
Springer
15 years 6 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
111
Voted
ICPR
2006
IEEE
16 years 1 months ago
Adaptive Discriminant Projection for Content-based Image Retrieval
Content-based Image Retrieval (CBIR) is a computer vision application that aims at automatically retrieving images based on their visual content. Linear Discriminat Analysis and i...
Jie Yu, Qi Tian
77
Voted
ICRA
2007
IEEE
114views Robotics» more  ICRA 2007»
15 years 7 months ago
A Short Paper about Motion Safety
— Motion safety for robotic systems operating in the real world is critical (especially when their size and dynamics make them potentially harmful for themselves or their environ...
Thierry Fraichard
97
Voted
CMS
2006
15 years 2 months ago
Perturbing and Protecting a Traceable Block Cipher
At the Asiacrypt 2003 conference Billet and Gilbert introduce a block cipher, which, to quote them, has the following paradoxical traceability properties: it is computationally ea...
Julien Bringer, Hervé Chabanne, Emmanuelle ...
99
Voted
WILF
2005
Springer
185views Fuzzy Logic» more  WILF 2005»
15 years 6 months ago
SVM Classification of Neonatal Facial Images of Pain
This paper reports experiments that explore performance differences in two previous studies that investigated SVM classification of neonatal pain expressions using the Infant COPE ...
Sheryl Brahnam, Chao-Fa Chuang, Frank Y. Shih, Mel...