Sciweavers

3305 search results - page 148 / 661
» Can we Rely on SQL
Sort
View
JCP
2007
88views more  JCP 2007»
13 years 10 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
ICRA
2010
IEEE
127views Robotics» more  ICRA 2010»
13 years 8 months ago
Coordinating collective locomotion in an amorphous modular robot
— Modular robots can potentially assemble into a wide range of configurations to locomote in different environments. However, designing locomotion strategies for each configura...
Chih-Han Yu, Justin Werfel, Radhika Nagpal
TC
2010
13 years 8 months ago
Authenticated Group Key Transfer Protocol Based on Secret Sharing
—Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most ofte...
Lein Harn, Changlu Lin
HCI
2009
13 years 8 months ago
The Five Commandments of Activity-Aware Ubiquitous Computing Applications
Recent work demonstrates the potential for extracting patterns from users' behavior as detected by sensors. Since there is currently no generalized framework for reasoning abo...
Nasim Mahmud, Jo Vermeulen, Kris Luyten, Karin Con...
TSP
2010
13 years 5 months ago
Methods for sparse signal recovery using Kalman filtering with embedded pseudo-measurement norms and quasi-norms
We present two simple methods for recovering sparse signals from a series of noisy observations. The theory of compressed sensing (CS) requires solving a convex constrained minimiz...
Avishy Carmi, Pini Gurfil, Dimitri Kanevsky