Sciweavers

1050 search results - page 11 / 210
» Two methods of authenticated positioning
Sort
View
CORR
2010
Springer
63views Education» more  CORR 2010»
14 years 11 months ago
Position Analysis of the RRP-3(SS) Multi-Loop Spatial Structure
The paper presents the position analysis of a spatial structure composed of two platforms mutually connected by one RRP and three SS serial kinematic chains, where R, P, and S sta...
Carlo Innocenti, Philippe Wenger
ISWC
2002
IEEE
15 years 4 months ago
Exploring the Dynamic Measurement of Position
This paper describes the development of several methods for the dynamic measurement of error distribution for positioning systems. When a user moves along a path at an unknown spe...
Cliff Randell, Henk L. Muller
FSKD
2005
Springer
98views Fuzzy Logic» more  FSKD 2005»
15 years 5 months ago
Extraction of Representative Keywords Considering Co-occurrence in Positive Documents
In linear text classification, user feedback is usually used to tune up the representative keywords (RK) for a certain class. Despite some algorithms (e.g. Rocchio) deal well with...
Byeong Man Kim, Qing Li, KwangHo Lee, Bo-Yeong Kan...
KDD
2008
ACM
137views Data Mining» more  KDD 2008»
16 years 2 days ago
Learning classifiers from only positive and unlabeled data
The input to an algorithm that learns a binary classifier normally consists of two sets of examples, where one set consists of positive examples of the concept to be learned, and ...
Charles Elkan, Keith Noto
DBSEC
2010
161views Database» more  DBSEC 2010»
15 years 1 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...