Sciweavers

16160 search results - page 3148 / 3232
» How to approach humans
Sort
View
PROVSEC
2009
Springer
14 years 19 days ago
Oracle Separation in the Non-uniform Model
Abstract. Oracle separation methods are used in cryptography to rule out blackbox reductions between cryptographic primitives. It is sufficient to find an oracle relative to whic...
Ahto Buldas, Sven Laur, Margus Niitsoo
UIC
2009
Springer
14 years 19 days ago
MeshVision: An Adaptive Wireless Mesh Network Video Surveillance System
The major surveillance camera manufacturers have begun incorporating wireless networking functionality into their products to enable wireless access. However, the video feeds from ...
Peizhao Hu, Ryan Wishart, Jimmy Ti, Marius Portman...
COSIT
2001
Springer
142views GIS» more  COSIT 2001»
14 years 18 days ago
The Utility of Global Representations in a Cognitive Map
In this paper we propose the use of small global memory for a viewer’s immediate surroundings to assist in recognising places that have been visited previously. We call this glob...
Margaret E. Jefferies, Wai K. Yeap
FOSSACS
2001
Springer
14 years 18 days ago
On Regular Message Sequence Chart Languages and Relationships to Mazurkiewicz Trace Theory
Hierarchical Message Sequence Charts are a well-established formalism to specify telecommunication protocols. In this model, numerous undecidability results were obtained recently ...
Rémi Morin
LPAR
2001
Springer
14 years 16 days ago
Local Conditional High-Level Robot Programs
When it comes to building robot controllers, highlevel programming arises as a feasible alternative to planning. The task then is to verify a high-level program by finding a lega...
Sebastian Sardiña
« Prev « First page 3148 / 3232 Last » Next »