Sciweavers

5401 search results - page 138 / 1081
» Using Versions in GIS
Sort
View
TCOM
2010
94views more  TCOM 2010»
15 years 2 months ago
Interference Management Using Nonlinear Relaying
—We consider the three-node Gaussian relay channel where the relay observes a noisy version of the interference present in the source–destination link. We investigate three fun...
Majid Nasiri Khormuji, Ali A. Zaidi, Mikael Skoglu...
COSIT
2007
Springer
114views GIS» more  COSIT 2007»
15 years 10 months ago
Spatial Information Extraction for Cognitive Mapping with a Mobile Robot
When animals (including humans) first explore a new environment, what they remember is fragmentary knowledge about the places visited. Yet, they have to use such fragmentary knowl...
Jochen Schmidt, Chee K. Wong, Wai K. Yeap
110
Voted
FSE
2007
Springer
116views Cryptology» more  FSE 2007»
15 years 10 months ago
Two General Attacks on Pomaranch-Like Keystream Generators
Two general attacks that can be applied to all versions and variants of the Pomaranch stream cipher are presented. The attacks are demonstrated on all versions and succeed with com...
Håkan Englund, Martin Hell, Thomas Johansson
SP
2000
IEEE
15 years 8 months ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
ECOOP
2008
Springer
15 years 5 months ago
Bristlecone: A Language for Robust Software Systems
We present Bristlecone, a programming language for robust software systems. Bristlecone applications have two components: a high-level organization description that specifies how t...
Brian Demsky, Alokika Dash