Sciweavers

2059 search results - page 330 / 412
» A Directed Threshold - Signature Scheme
Sort
View
CRYPTO
2003
Springer
109views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Weak Key Authenticity and the Computational Completeness of Formal Encryption
Abstract. A significant effort has recently been made to rigorously relate the formal treatment of cryptography with the computational one. A first substantial step in this dire...
Omer Horvitz, Virgil D. Gligor
ECAL
2003
Springer
15 years 9 months ago
Low-Level Visual Homing
Abstract. We present a variant of the snapshot model [1] for insect visual homing. In this model a snapshot image is taken by an agent at the goal position. The disparity between c...
Andrew Vardy, Franz Oppacher
FMCO
2003
Springer
114views Formal Methods» more  FMCO 2003»
15 years 9 months ago
Synchronous Closing and Flow Analysis for Model Checking Timed Systems
Abstract. Formal methods, in particular model checking, are increasingly accepted as integral part of system development. With large software systems beyond the range of fully auto...
Natalia Ioustinova, Natalia Sidorova, Martin Steff...
ICANN
2003
Springer
15 years 9 months ago
Dimension Reduction Based on Orthogonality - A Decorrelation Method in ICA
In independent component analysis problems, when we use a one-unit objective function to iteratively estimate several independent components, the uncorrelatedness between the indep...
Kun Zhang, Lai-Wan Chan
ICRA
2002
IEEE
147views Robotics» more  ICRA 2002»
15 years 9 months ago
Exploiting Physical Dynamics for Concurrent Control of a Mobile Robot
Conventionally, mobile robots are controlled through an action selection mechanism (ASM) that chooses among multiple proposed actions. This choice can be made in a variety of ways...
Brian P. Gerkey, Maja J. Mataric, Gaurav S. Sukhat...