Sciweavers

2259 search results - page 243 / 452
» Separation and information hiding
Sort
View
ACSAC
2003
IEEE
15 years 6 months ago
Practical Random Number Generation in Software
There is a large gap between the theory and practice for random number generation. For example, on most operating systems, using /dev/random to generate a 256-bit AES key is highl...
John Viega
95
Voted
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 6 months ago
Electronic Voting: Algorithmic and Implementation Issues
Electronic Transactions over the Internet, particularly using the World Wide Web have become an integral part of economic life. Recently also the public sector has started to use ...
Robert Kofler, Robert Krimmer, Alexander Prosser
85
Voted
AIIA
2003
Springer
15 years 6 months ago
Image-Based Monte-Carlo Localisation without a Map
In this paper, we propose a way to fuse the image-based localisation approach with the Monte-Carlo localisation approach. The method we propose does not suffer of the major limitat...
Emanuele Menegatti, Mauro Zoccarato, Enrico Pagell...
74
Voted
CAISE
2003
Springer
15 years 6 months ago
Coordination for Distributed Business Systems
Abstract. We motivate, discuss and present extensions to architecture modelling techniques through which business systems can support services and applications that are location an...
Luis Filipe Andrade, José Luiz Fiadeiro, An...
100
Voted
CDC
2009
IEEE
132views Control Systems» more  CDC 2009»
15 years 5 months ago
Optimal sensor placement for time difference of arrival localization
— This paper addresses the problem of localizing a source from noisy time-of-arrival measurements. In particular, we are interested in the optimal placement of M planar sensors s...
Jason T. Isaacs, Daniel J. Klein, João Pedr...