Sciweavers

1617 search results - page 225 / 324
» Knowledge Condition Games
Sort
View
RTA
2007
Springer
14 years 3 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Coarse-to-Fine Pedestrian Localization and Silhouette Extraction for the Gait Challenge Data Sets
This paper presents a localized coarse-to-fine algorithm for efficient and accurate pedestrian localization and silhouette extraction for the Gait Challenge data sets. The coars...
Haiping Lu, Konstantinos N. Plataniotis, Anastasio...
ICRA
2006
IEEE
95views Robotics» more  ICRA 2006»
14 years 3 months ago
Power Assist System for Sinusoidal Motion by Passive Element and Impedance Control
— In this paper, we propose a power assist system that amplifies sinusoidal human’s torque and attains minimization of control input requirement using an impedance control and...
Mitsunori Uemura, Katsuya Kanaoka, Sadao Kawamura
INFOCOM
2006
IEEE
14 years 3 months ago
Source-Assisted Direction Estimation Inside Buildings
— Direction estimation inside buildings is a difficult and challenging task due to severe multipath signal propagation. Numerous algorithms and techniques exist that provide hig...
Kamran Sayrafian-Pour, Dominik Kaspar
P2P
2006
IEEE
120views Communications» more  P2P 2006»
14 years 3 months ago
Risk Driven Semantic P2P Service Retrieval
In this paper, we present a novel approach, named RS2D, to risk driven semantic service query routing in unstructured, so called pure P2P networks. Following the RS2D protocol, ea...
Matthias Klusch, Ulrich Basters