Sciweavers

14 search results - page 2 / 3
» In Defence of the 8-Point Algorithm
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Minimizing the Cost of Mine Selection Via Sensor Networks
— In this paper, we study sensor enabled landmine networks by formulating a minimum-cost mine selection problem. The problem arises in a target defence scenario, where the object...
Changlei Liu, Guohong Cao
ATAL
2007
Springer
14 years 2 months ago
The human agent virtual environment
In this paper we describe a multi-agent simulation called the Human Agent Virtual Environment (or HAVE). HAVE is a test bed to explore agent-environment interaction in multiagent ...
Michael Papasimeon, Adrian R. Pearce, Simon Goss
CCCG
2006
13 years 10 months ago
On Planar Path Transformation
A flip or edge-replacement is considered as a transformation by which one edge e of a geometric object is removed and an edge f (f = e) is inserted such that the resulting object ...
Kamrul Islam, Selim G. Akl, Henk Meijer
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
14 years 1 months ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart
ACSC
2006
IEEE
14 years 2 months ago
Unsupervised band removal leading to improved classification accuracy of hyperspectral images
Remotely-sensed images of the earth’s surface are used across a wide range of industries and applications including agriculture, mining, defence, geography and geology, to name ...
R. Ian Faulconbridge, Mark R. Pickering, Michael J...