Agency detection is studied in a simple simulated model with embodied agents. Psychological experiments such as double TV-monitor experiments and perceptual crossing show the centr...
We present a method to recover scenes deteriorated by superposition of transparent and semi-reflected contributions, as appear in reflections off windows. Separating the superimpo...
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
: This paper addresses a specific problem that may arise as consequence of the globalization of the markets. This is the incompatibility between local and global standards of trust...
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...