Sciweavers

329 search results - page 53 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
EG
2007
92views more  EG 2007»
13 years 7 months ago
Service innovation for e-government: a broadband-based example
: This paper investigates the relationship between broadband and service innovation in an e-government context. We ask, what characterizes successful broadband based service innova...
Bendik Bygstad, Gjermund Lanestedt, Jyoti Choudrie
JIRS
2006
113views more  JIRS 2006»
13 years 7 months ago
Using Virtual Pheromones and Cameras for Dispersing a Team of Multiple Miniature Robots
To safely and efficiently guide personnel of search and rescue operations in disaster areas, swift gathering of relevant information such as the locations of victims, must occur. U...
Janice L. Pearce, Bob Powers, Chistopher Hess, Pau...
JODL
2006
136views more  JODL 2006»
13 years 7 months ago
An experimental effectiveness comparison of methods for 3D similarity search
Methods for content-based similarity search are fundamental for managing large multimedia repositories, as they make it possible to conduct queries for similar content, and to orga...
Benjamin Bustos, Daniel A. Keim, Dietmar Saupe, To...
SIGECOM
2008
ACM
144views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Incentives for expressing opinions in online polls
Prediction markets efficiently extract and aggregate the private information held by individuals about events and facts that can be publicly verified. However, facts such as the e...
Radu Jurca, Boi Faltings
TSMC
2008
110views more  TSMC 2008»
13 years 7 months ago
Navigation Technologies for Autonomous Underwater Vehicles
With recent advances in battery capacity and the development of hydrogen fuel cells, autonomous underwater vehicles (AUVs) are being used to undertake longer missions that were pre...
L. Stutters, Honghai Liu, C. Tiltman, David J. Bro...