Sciweavers

1050 search results - page 61 / 210
» Two methods of authenticated positioning
Sort
View
FOSAD
2000
Springer
15 years 3 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
ACISP
2009
Springer
15 years 6 months ago
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
Abstract. Two of the most recent and powerful multi-property-preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ES...
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
ICRA
2007
IEEE
171views Robotics» more  ICRA 2007»
15 years 6 months ago
Visual Servoing by Optimization of a 2D/3D Hybrid Objective Function
— In this paper, we present a new hybrid visual servoing algorithm for robot arm positioning task. Hybrid methods in visual servoing partially combine the 2D and 3D visual inform...
A. H. Abdul Hafez, C. V. Jawahar
ETRA
2010
ACM
167views Biometrics» more  ETRA 2010»
15 years 6 months ago
Understanding the benefits of gaze enhanced visual search
In certain applications such as radiology and imagery analysis, it is important to minimize errors. In this paper we evaluate a structured inspection method that uses eye tracking...
Pernilla Qvarfordt, Jacob T. Biehl, Gene Golovchin...
AI
2003
Springer
15 years 5 months ago
Case Authoring from Text and Historical Experiences
The problem of repair and maintenance of complex systems, such as aircraft, cars and trucks is certainly a nontrivial task. Maintenance technicians must use a great amount of knowl...
Marvin Zaluski, Nathalie Japkowicz, Stan Matwin