Sciweavers

1050 search results - page 36 / 210
» Two methods of authenticated positioning
Sort
View
ICCAD
1998
IEEE
66views Hardware» more  ICCAD 1998»
15 years 4 months ago
Tight integration of combinational verification methods
Combinational verification is an important piece of most equivalence checking tools. In the recent past, many combinational verification algorithms have appeared in the literature...
Jerry R. Burch, Vigyan Singhal
CSFW
1999
IEEE
15 years 4 months ago
Mixed Strand Spaces
Strand space analysis [13, 12] is a method for stating and proving correctness properties for cryptographic protocols. In this paper we apply the same method to the related proble...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
86
Voted
ACCV
2007
Springer
15 years 6 months ago
Mirror Localization for Catadioptric Imaging System by Observing Parallel Light Pairs
This paper describes a method of mirror localization to calibrate a catadioptric imaging system. While the calibration of a catadioptric system includes the estimation of various p...
Ryusuke Sagawa, Nobuya Aoki, Yasushi Yagi
CIKM
2009
Springer
15 years 6 months ago
Evaluation of methods for relative comparison of retrieval systems based on clickthroughs
The Cranfield evaluation method has some disadvantages, including its high cost in labor and inadequacy for evaluating interactive retrieval techniques. As a very promising alter...
Jing He, Chengxiang Zhai, Xiaoming Li
ROBOTICA
2006
133views more  ROBOTICA 2006»
14 years 11 months ago
WiFi localization methods for autonomous robots
This paper compares two methods to estimate the position of a mobile robot in an indoor environment using only odometric calculus and the WiFi energy received from the wireless co...
Vicente Matellán Olivera, José Mar&i...