Sciweavers

1116 search results - page 105 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ICC
2009
IEEE
149views Communications» more  ICC 2009»
14 years 2 months ago
Performance of Host Identity Protocol on Symbian OS
—The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multihoming in the Internet. HIP uses self-certifying publicpriva...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
JIRS
2007
78views more  JIRS 2007»
13 years 7 months ago
Online-learning and Attention-based Approach to Obstacle Avoidance Using a Range Finder
The problem of developing local reactive obstacle-avoidance behaviors by a mobile robot through online real-time learning is considered. The robot operated in an unknown bounded 2...
Shuqing Zeng, Juyang Weng
KBSE
2007
IEEE
14 years 2 months ago
Using information retrieval to support design of incremental change of software
The proposed research defines an approach to combine Information Retrieval based analysis of the textual information embedded in software artifacts with program static and dynamic...
Denys Poshyvanyk, Andrian Marcus
AUTOMATICA
2005
155views more  AUTOMATICA 2005»
13 years 7 months ago
Identification of MIMO Hammerstein models using least squares support vector machines
This paper studies a method for the identification of Hammerstein models based on Least Squares Support Vector Machines (LS-SVMs). The technique allows for the determination of th...
Ivan Goethals, Kristiaan Pelckmans, Johan A. K. Su...
CORR
2008
Springer
138views Education» more  CORR 2008»
13 years 8 months ago
An Improved Robust Fuzzy Extractor
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W to agree on a secret key R in the presence of an active ...
Bhavana Kanukurthi, Leonid Reyzin