Sciweavers

522 search results - page 85 / 105
» Necessary but Not Sufficient
Sort
View
CVIU
2008
107views more  CVIU 2008»
13 years 7 months ago
Reducing drift in differential tracking
We present methods for turning pair-wise registration algorithms into drift-free trackers. Such registration algorithms are abundant, but the simplest techniques for building trac...
Ali Rahimi, Louis-Philippe Morency, Trevor Darrell
IJACT
2008
136views more  IJACT 2008»
13 years 7 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
AAI
1999
91views more  AAI 1999»
13 years 7 months ago
Multilingual Natural Language Generation for Multilingual Software: A Functional Linguistic Approach
In this paper we present an implemented account of multilingual linguistic resources for multilingual text generation that improves significantly on the degree of re-use of resour...
John A. Bateman, Christian Matthiessen, Licheng Ze...
SYNTHESE
2008
81views more  SYNTHESE 2008»
13 years 7 months ago
The inclosure scheme and the solution to the paradoxes of self-reference
All paradoxes of self-reference seem to share some structural features. Russell in 1908 and especially Priest nowadays have advanced structural descriptions that successfully ident...
Jordi Valor Abad
IEEEIAS
2009
IEEE
13 years 5 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng