Sciweavers

255 search results - page 38 / 51
» The Reconstruction of a Mobile Agent Computation and Its Val...
Sort
View
ICPR
2008
IEEE
15 years 10 months ago
Securing fingerprint template: Fuzzy vault with minutiae descriptors
Fuzzy vault has been shown to be an effective technique for securing fingerprint minutiae templates. Its security depends on the difficulty in identifying the set of genuine minut...
Abhishek Nagar, Anil K. Jain, Karthik Nandakumar
79
Voted
CVPR
1998
IEEE
15 years 11 months ago
Stereo and Color Analysis for Dynamic Obstacle Avoidance
We develop a vision system for highly mobile autonomous agents that is capable of dynamic obstacle avoidance. We demonstrate the robust performance of the system in artificial ani...
Tamer F. Rabie, Demetri Terzopoulos
IJCNN
2008
IEEE
15 years 3 months ago
Learning to select relevant perspective in a dynamic environment
— When an agent observes its environment, there are two important characteristics of the perceived information. One is the relevance of information and the other is redundancy. T...
Zhihui Luo, David A. Bell, Barry McCollum, Qingxia...
ICCSA
2005
Springer
15 years 3 months ago
Secure Forwarding Scheme Based on Session Key Reuse Mechanism in HMIPv6 with AAA
Abstract. Due to an increasing number of portable devices over 785million world Internet users, a support for quality of service (QoS) and security becomes a significant issue in ...
Kwang Chul Jeong, Hyunseung Choo, Sungchang Lee
ICDCSW
2003
IEEE
15 years 2 months ago
MESH Mdl - A Middleware for Self-Organization in Ad Hoc Networks
— The maturing domain of ad hoc networking still holds some major challenges on its way to commercial exploitation. The dynamic and decentralized nature of ad hoc networks calls ...
Klaus Herrmann