Sciweavers

471 search results - page 79 / 95
» From Sequential Processes to Grid Computation
Sort
View
ACSAC
2009
IEEE
14 years 1 months ago
A Guided Tour Puzzle for Denial of Service Prevention
Abstract—Various cryptographic puzzle schemes are proposed as a defense mechanism against denial of service attack. But, all these puzzle schemes face a dilemma when there is a l...
Mehmud Abliz, Taieb Znati
DMIN
2009
180views Data Mining» more  DMIN 2009»
13 years 6 months ago
APHID: A Practical Architecture for High-Performance, Privacy-Preserving Data Mining
While the emerging field of privacy preserving data mining (PPDM) will enable many new data mining applications, it suffers from several practical difficulties. PPDM algorithms are...
Jimmy Secretan, Anna Koufakou, Michael Georgiopoul...
IROS
2006
IEEE
162views Robotics» more  IROS 2006»
14 years 2 months ago
Efficiency Improvement in Monte Carlo Localization through Topological Information
- Monte Carlo localization is known to be one of the most reliable methods for pose estimation of a mobile robot. Many studies have been conducted to improve performance of MCL. Al...
Tae-Bum Kwon, Ju-Ho Yang, Jae-Bok Song, Woojin Chu...
ICRA
2008
IEEE
185views Robotics» more  ICRA 2008»
14 years 3 months ago
Human detection using multimodal and multidimensional features
— This paper presents a novel human detection method based on a Bayesian fusion approach using laser range data and camera images. Laser range data analysis groups data points wi...
Luciano Spinello, Roland Siegwart
ICASSP
2011
IEEE
13 years 15 days ago
A near-optimal least squares solution to received signal strength difference based geolocation
A simple geometric interpretation for received signal strength (RSS) difference based geolocation can be illustrated by considering a plane containing a single pair of receivers a...
Sichun Wang, Robert J. Inkol