Sciweavers

1050 search results - page 87 / 210
» Two methods of authenticated positioning
Sort
View
CIDM
2007
IEEE
15 years 8 months ago
Analysis of streaming GPS measurements of surface displacement through a web services environment
Abstract— We present a method for performing mode classification of real-time streams of GPS surface position data. Our approach has two parts: an algorithm for robust, unconstr...
Robert Granat, Galip Aydin, Marlon E. Pierce, Zhig...
137
Voted
ATAL
2003
Springer
15 years 5 months ago
Using web helper agent profiles in query generation
Personalized information agents can help overcome some of the limitations of communal Web information sources such as portals and search engines. Two important components of these...
Gabriel Somlo, Adele E. Howe
FLAIRS
2010
15 years 4 months ago
Learning to Identify and Track Imaginary Objects Implied by Gestures
A vision-based machine learner is presented that learns characteristic hand and object movement patterns for using certain objects, and uses this information to recreate the "...
Andreya Piplica, Alexandra Olivier, Allison Petros...
HUC
2010
Springer
15 years 3 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
COMPSEC
2004
131views more  COMPSEC 2004»
15 years 1 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...