Sciweavers

2645 search results - page 372 / 529
» Autonomous security for autonomous systems
Sort
View
DBSEC
2003
113views Database» more  DBSEC 2003»
15 years 6 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
MOR
2010
115views more  MOR 2010»
14 years 11 months ago
Directional Derivatives of Oblique Reflection Maps
Given an oblique reflection map and functions , Dlim (the space of functions that have left and right limits at every point), the directional derivative () of along , evaluate...
Avi Mandelbaum, Kavita Ramanan
ICRA
2002
IEEE
188views Robotics» more  ICRA 2002»
15 years 9 months ago
Hybrid Mobile Robot Localization using Switching State-Space Models
—This article describes a rigorous and complete framework for the simultaneous localization and map building problem for mobile robots: the symmetries and perturbations map (SPma...
Haris Baltzakis, Panos E. Trahanias
155
Voted
DIS
1999
Springer
15 years 9 months ago
The Melting Pot of Automated Discovery: Principles for a New Science
After two decades of research on automated discovery, many principles are shaping up as a foundation of discovery science. In this paper we view discovery science as automation of ...
Jan M. Zytkow
DAWAK
2006
Springer
15 years 8 months ago
A Versioning Management Model for Ontology-Based Data Warehouses
More and more integration systems use ontologies to solve the problem of semantic heterogeneities between autonomous databases. To automate the integration process, a number of the...
Dung Nguyen Xuan, Ladjel Bellatreche, Guy Pierra