Abstract— In stream authentication protocols used for largescale data dissemination in autonomuous systems, authentication is based on the timing of the publication of keys, and ...
Mehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Govern...
Previous studies indicate that the expected effects of e-Government are slower to realize than initially expected. Several authors argue that e-Government involves particularly co...
Prior research has demonstrated that the degrees and impact of customer trust on purchase intentions change with online experience. While online trust research has incorporated an...
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
– In Bayesian based approaches to mobile robot simultaneous localization and mapping, Rao-Blackwellized particle filters (RBPF) enable the efficient estimation of the posterior b...