Sciweavers

1592 search results - page 199 / 319
» The state of the email address
Sort
View
SISAP
2009
IEEE
122views Data Mining» more  SISAP 2009»
15 years 7 months ago
Dynamic Spatial Approximation Trees for Massive Data
—Metric space searching is an emerging technique to address the problem of efficient similarity searching in many applications, including multimedia databases and other reposito...
Gonzalo Navarro, Nora Reyes
NTMS
2009
IEEE
15 years 7 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
105
Voted
ICRA
2009
IEEE
122views Robotics» more  ICRA 2009»
15 years 7 months ago
Cooperative multi-robot localization under communication constraints
— This paper addresses the problem of cooperative localization (CL) under severe communication constraints. Specifically, we present minimum mean square error (MMSE) and maximum...
Nikolas Trawny, Stergios I. Roumeliotis, Georgios ...
ASIACRYPT
2009
Springer
15 years 7 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
120
Voted
TRUST
2009
Springer
15 years 7 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...