Sciweavers

1050 search results - page 30 / 210
» Two methods of authenticated positioning
Sort
View
ESORICS
2008
Springer
15 years 1 months ago
Dismantling MIFARE Classic
The mifare Classic is a contactless smart card that is used extensively in access control for office buildings, payment systems for public transport, and other applications. We rev...
Flavio D. Garcia, Gerhard de Koning Gans, Ruben Mu...
ISER
2000
Springer
133views Robotics» more  ISER 2000»
15 years 3 months ago
Merging Gaussian Distributions for Object Localization in Multi-robot Systems
: We present a method for representing, communicating, and fusing distributed, noisy, and uncertain observations of an object by multiple robots. The approach relies on re-paramete...
Ashley W. Stroupe, Martin C. Martin, Tucker R. Bal...
ADHOC
2007
100views more  ADHOC 2007»
14 years 12 months ago
A GPS-less, outdoor, self-positioning method for wireless sensor networks
One challenging issue in sensor networks is to determine where a given sensor node is physically located. This problem is especially crucial for very small sensor nodes. This pape...
Hung-Chi Chu, Rong-Hong Jan
ICASSP
2011
IEEE
14 years 3 months ago
Regularized split gradient method for nonnegative matrix factorization
This article deals with a regularized version of the split gradient method (SGM), leading to multiplicative algorithms. The proposed algorithm is available for the optimization of...
Henri Lantéri, Céline Theys, C&eacut...
EUROMICRO
2004
IEEE
15 years 3 months ago
Introducing Agile Methods: Three Years of Experience
The paper summarizes three years of experience of introducing agile practices in academic environments. The perceptions of students from four different academic programs (Diploma,...
Grigori Melnik, Frank Maurer