Sciweavers

2478 search results - page 156 / 496
» Message from the Chair
Sort
View
IPL
2000
101views more  IPL 2000»
15 years 4 months ago
Visual cryptography for grey level images
Visual cryptography is a cryptographic paradigm introduced by Naor and Shamir [Lecture Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1995, p. 1]. Some predefined set of parti...
Carlo Blundo, Alfredo De Santis, Moni Naor
ICRA
2010
IEEE
153views Robotics» more  ICRA 2010»
15 years 3 months ago
Communication-based leashing of real flying robots
—— Aerial robots are often required to remain within the communication range of a base station on the ground to exchange commands, sensor data or as a safety mechanism. For this...
Sabine Hauert, Severin Leven, Jean-Christophe Zuff...
IJAHUC
2010
130views more  IJAHUC 2010»
15 years 3 months ago
Secure traffic data propagation in Vehicular Ad Hoc Networks
: In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We pres...
Baber Aslam, Soyoung Park, Cliff Changchun Zou, Da...
IJWET
2010
142views more  IJWET 2010»
15 years 3 months ago
Interaction protocol mediation in web service composition
: This article presents a mediation framework supporting the integration of web services in orchestrated and choreographed services and the conciliation of interaction protocol mis...
Liliana Ardissono, Roberto Furnari, Giovanna Petro...
CHI
2009
ACM
15 years 2 months ago
Auditory priming for upcoming events
Psychologically preparing for upcoming events can be a difficult task, particularly when switching social contexts, e.g., from office work to a family event. To help with such tra...
Timothy Sohn, Leila Takayama, Dean Eckles, Rafael ...