Sciweavers

1050 search results - page 21 / 210
» Two methods of authenticated positioning
Sort
View
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 5 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
BMCBI
2008
128views more  BMCBI 2008»
14 years 12 months ago
Finding sequence motifs with Bayesian models incorporating positional information: an application to transcription factor bindin
Background: Biologically active sequence motifs often have positional preferences with respect to a genomic landmark. For example, many known transcription factor binding sites (T...
Nak-Kyeong Kim, Kannan Tharakaraman, Leonardo Mari...
ICRA
2006
IEEE
136views Robotics» more  ICRA 2006»
15 years 5 months ago
Fault Detection for Mobile Robots using Redundant Positioning Systems
— Reliable navigation is a very important part of an autonomous mobile robot system. This means for instance that the robot should not lose track of its position, even if unexpec...
Paul Sundvall, Patric Jensfelt
INFOCOM
2007
IEEE
15 years 6 months ago
RFID-Based 3-D Positioning Schemes
Abstract— This research focuses on RFID-based 3-D positioning schemes, aiming to locate an object in a 3-dimensional space, with reference to a predetermined arbitrary coordinate...
Chong Wang, Hongyi Wu, Nian-Feng Tzeng
NBIS
2009
Springer
15 years 6 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena