Sciweavers

4529 search results - page 66 / 906
» Position Based Cryptography
Sort
View
ILP
2001
Springer
15 years 7 months ago
Learning Functions from Imperfect Positive Data
The Bayesian framework of learning from positive noise-free examples derived by Muggleton [12] is extended to learning functional hypotheses from positive examples containing norma...
Filip Zelezný
115
Voted
RFIDSEC
2010
15 years 15 days ago
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensu...
Gildas Avoine, Benjamin Martin 0002, Tania Martin
101
Voted
EUROPAR
2007
Springer
15 years 8 months ago
Analysis of a Kalman Approach for a Pedestrian Positioning System in Indoor Environments
In this work we present the design principles of a wearable positioning system for users in unprepared indoor environments. We describe the most suitable technology for our applica...
Edith Pulido Herrera, Ricardo Quirós, Hanne...
FSKD
2005
Springer
98views Fuzzy Logic» more  FSKD 2005»
15 years 8 months ago
Extraction of Representative Keywords Considering Co-occurrence in Positive Documents
In linear text classification, user feedback is usually used to tune up the representative keywords (RK) for a certain class. Despite some algorithms (e.g. Rocchio) deal well with...
Byeong Man Kim, Qing Li, KwangHo Lee, Bo-Yeong Kan...
ISWC
1999
IEEE
15 years 7 months ago
Combining Positional Information with Visual Media
By integrating visual media with positioning information obtained with our wearable computer, we create new opportunities for using visuals both in the field and at the workstatio...
Neill W. Campbell, Henk L. Muller, Cliff Randell