Sciweavers

1050 search results - page 38 / 210
» Two methods of authenticated positioning
Sort
View
DISCEX
2003
IEEE
15 years 5 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
CGF
2010
185views more  CGF 2010»
14 years 12 months ago
Constrained Texture Mapping using Image Warping
We introduce in this paper a new method for smooth foldover-free warping of images. It allows users to specify the constraints in two different ways: positional constraints to con...
Hyewon Seo, Frederic Cordier
JUCS
2010
118views more  JUCS 2010»
14 years 10 months ago
Reachability in Restricted Walk on Integers
: We prove that two conditions are sufficient, and with three exceptions also necessary, for reachability of any position in restricted walk on integers in which the sizes of the m...
Philip Ginzboorg, Valtteri Niemi
ISBI
2007
IEEE
15 years 6 months ago
Precise Localization of Fluorescent Probes without Numerical Fitting
A new algorithm for determining the location of a fluorescent probe in the plane is described. Inspired by the Bancroft algorithm for localization in the global positioning syste...
Sean B. Andersson
IROS
2006
IEEE
116views Robotics» more  IROS 2006»
15 years 5 months ago
Virtual Camera Synthesis for Micromanipulation and Microassembly
— The vision system for micromanipulation and microassembly usually includes at least two cameras allowing top and lateral views of the work field. The top view is used to contr...
Julien Bert, Sounkalo Dembélé, Nadin...