Sciweavers

314 search results - page 27 / 63
» Cubical token systems
Sort
View
IMECS
2007
13 years 10 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
14 years 26 days ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
DC
2007
13 years 8 months ago
Randomized self-stabilizing and space optimal leader election under arbitrary scheduler on rings
We present a randomizedself-stabilizing leaderelection protocol and a randomizedself-stabilizing token circulation protocol under an arbitrary scheduler on anonymous and unidirect...
Joffroy Beauquier, Maria Gradinariu, Colette Johne...
ICRA
2002
IEEE
125views Robotics» more  ICRA 2002»
14 years 1 months ago
Natural Landmark Based Localisation System using Panoramic Images
A panoramic image based localisation system has been implemented on a B21r mobile robot and tested in a heavily cluttered environment. It takes vertical object edges as natural la...
David C. K. Yuen, Bruce A. MacDonald
CEAS
2004
Springer
14 years 2 months ago
SpamGuru: An Enterprise Anti-Spam Filtering System
Spam-reduction techniques have developed rapidly over the last few years, as spam volumes have increased. We believe that no one anti-spam solution is the “right” answer, and t...
Richard Segal, Jason Crawford, Jeffrey O. Kephart,...