Sciweavers

817 search results - page 129 / 164
» Robust Euclidean embedding
Sort
View
MMS
2008
14 years 9 months ago
On error-correcting fingerprinting codes for use with watermarking
Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal c...
Hans Georg Schaathun
RAS
2002
115views more  RAS 2002»
14 years 9 months ago
Towards vision-based safe landing for an autonomous helicopter
Autonomous landing is a challenging problem for aerial robots. An autonomous landing manoeuver depends largely on two capabilities: the decision of where to land and the generatio...
Pedro J. Garcia-Pardo, Gaurav S. Sukhatme, James F...
ICMS
2010
14 years 8 months ago
TADD: A Computational Framework for Data Analysis Using Discrete Morse Theory
This paper presents a computational framework that allows for a robust extraction of the extremal structure of scalar and vector fields on 2D manifolds embedded in 3D. This struct...
Jan Reininghaus, David Günther, Ingrid Hotz, ...
SAFECOMP
2010
Springer
14 years 8 months ago
Security Analysis of Open Building Automation Systems
Abstract. With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on...
Wolfgang Granzer, Wolfgang Kastner
CAV
2010
Springer
227views Hardware» more  CAV 2010»
14 years 7 months ago
Breach, A Toolbox for Verification and Parameter Synthesis of Hybrid Systems
We describe Breach, a Matlab toolbox providing a coherent set of simulation-based techniques aimed at the analysis of deterministic models of hybrid dynamical systems. The primary ...
Alexandre Donzé