Sciweavers

1050 search results - page 69 / 210
» Two methods of authenticated positioning
Sort
View
ICRA
2008
IEEE
183views Robotics» more  ICRA 2008»
15 years 6 months ago
Hybrid image-plane/stereo (HIPS) for orientation control of manipulators
— Planetary exploration systems, operating under severe environmental and operating conditions, have thus far successfully employed carefully calibrated stereo cameras and manipu...
Kevin Nickels
84
Voted
ISMAR
2003
IEEE
15 years 5 months ago
Robust Vision-Based Registration Utilizing Bird's-Eye View with User's View
This paper describes new vision-based registration methods utilizing not only cameras on a user’s head-mounted display but also a bird’s-eye view camera that observes the user...
Kiyohide Satoh, Shinji Uchiyama, Hiroyuki Yamamoto...
ECCV
2002
Springer
16 years 1 months ago
Face Recognition from Long-Term Observations
We address the problem of face recognition from a large set of images obtained over time - a task arising in many surveillance and authentication applications. A set or a sequence ...
Gregory Shakhnarovich, John W. Fisher III, Trevor ...
ICC
2007
IEEE
171views Communications» more  ICC 2007»
15 years 6 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan
AUSFORENSICS
2004
15 years 1 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot