Sciweavers

2997 search results - page 386 / 600
» Fuzzy robustness analysis
Sort
View
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
14 years 3 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
SASN
2005
ACM
14 years 3 months ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
AIME
2005
Springer
14 years 3 months ago
Which Kind of Knowledge Is Suitable for Redesigning Hospital Logistic Processes?
A knowledge management perspective is rarely used to model a process. Using the cognitive perspective on knowledge management in which we start our analysis with events and knowled...
Laura Maruster, René J. Jorna
ATAL
2005
Springer
14 years 3 months ago
Simulating data dissemination techniques for local reputation systems
In distributed scenarios the robustness of a reputation mechanism depends on the data available for computation. Especially in ad-hoc networks the amount of available data is rest...
Andreas Schlosser, Marco Voss
E4MAS
2005
Springer
14 years 3 months ago
An Environment-Based Methodology to Design Reactive Multi-agent Systems for Problem Solving
Abstract. Even if the multi-agent paradigm has been evolving for fifteen years, the development of concrete methods for problem solving remains a major challenge. This paper focus...
Olivier Simonin, Franck Gechter