Sciweavers

10066 search results - page 1907 / 2014
» A Technique for Information System Integration
Sort
View
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 9 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
TCSV
2008
124views more  TCSV 2008»
13 years 9 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
TIT
2008
129views more  TIT 2008»
13 years 9 months ago
Cooperative Fading Regions for Decode and Forward Relaying
Abstract--Cooperative transmission protocols over fading channels are based on a number of relaying nodes to form virtual multiantenna transmissions. Diversity provided by these te...
Stefano Savazzi, Umberto Spagnolini
RAS
2000
170views more  RAS 2000»
13 years 8 months ago
Visual servoing and appearance for navigation
We address the problem of visual-based navigation of a mobile robot in indoors environments. The robot control system is based on a single camera to provide the required visual fe...
Raquel Frizera Vassallo, Hans J. Schneebeli, Jos&e...
AI
1999
Springer
13 years 8 months ago
Cooperative Behavior Acquisition for Mobile Robots in Dynamically Changing Real Worlds Via Vision-Based Reinforcement Learning a
In this paper, we first discuss the meaning of physical embodiment and the complexity of the environment in the context of multi-agent learning. We then propose a vision-based rei...
Minoru Asada, Eiji Uchibe, Koh Hosoda
« Prev « First page 1907 / 2014 Last » Next »