Sciweavers

4899 search results - page 216 / 980
» Robust normative systems
Sort
View
CCS
2008
ACM
15 years 7 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
DAS
2008
Springer
15 years 7 months ago
Handling of Surface Modifications for Robust Image Based Mail Piece Comparison
Image based mail piece identification is a new technology for optimizing the postal sorting process. Exploiting the mail piece surface uniqueness, characteristic features are used...
Katja Worm, Beate Meffert
VCIP
2003
152views Communications» more  VCIP 2003»
15 years 6 months ago
Robust approach for color image quality assessment
This paper presents a visual color image quality metric assessment with full reference image. The metric is highly based on human visual system properties in order to get the best...
Patrick Le Callet, Dominique Barba
CORR
2008
Springer
153views Education» more  CORR 2008»
15 years 5 months ago
Efficient and Robust Secure Aggregation for Sensor Networks
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
Parisa Haghani, Panagiotis Papadimitratos, Marcin ...
AR
2006
94views more  AR 2006»
15 years 5 months ago
Stability analysis and robust composite controller synthesis for flexible joint robots
In this paper the control of exible joint manipulators is studied in detail. The model of N{axis exible joint manipulators are derived and reformulated in the form of singular per...
H. D. Taghirad, M. A. Khosravi