Sciweavers

1050 search results - page 201 / 210
» Two methods of authenticated positioning
Sort
View
93
Voted
COCOA
2007
Springer
15 years 5 months ago
On the Complexity of Some Colorful Problems Parameterized by Treewidth
Abstract. We study the complexity of several coloring problems on graphs, parameterized by the treewidth t of the graph: (1) The list chromatic number χl(G) of a graph G is defin...
Michael R. Fellows, Fedor V. Fomin, Daniel Lokshta...
IROS
2006
IEEE
107views Robotics» more  IROS 2006»
15 years 5 months ago
Image Mapping and Visual Attention on a Sensory Ego-Sphere
Abstract— The Sensory Ego-Sphere (SES) is a short-term memory for a robot in the form of an egocentric, tessellated, spherical, sensory-motor map of the robot’s locale. This pa...
Katherine Achim Fleming, Richard Alan Peters II, R...
78
Voted
NORDICHI
2006
ACM
15 years 5 months ago
The FaceReader: measuring instant fun of use
Recently, more and more attention has been paid to emotions in the domain of Human-Computer Interaction. When evaluating a product, one can no longer ignore the emotions a product...
Bieke Zaman, Tara Shrimpton-Smith
ICDCSW
2005
IEEE
15 years 5 months ago
Zmail: Zero-Sum Free Market Control of Spam
The problem of spam is a classic “tragedy of the commons” [10]. We propose the Zmail protocol as a way to preserve email as a “free” common resource for most users, while ...
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Moha...
92
Voted
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 5 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay