Sciweavers

796 search results - page 72 / 160
» Spoofing prevention method
Sort
View
PERVASIVE
2009
Springer
14 years 4 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
ICRA
2007
IEEE
160views Robotics» more  ICRA 2007»
14 years 4 months ago
Virtual Fixture Control for Compliant Human-Machine Interfaces
— In human-machine collaborative systems, robot joint compliance and human-input dynamics lead to involuntary tool motion into undesired regions. To correct this, a set of method...
Panadda Marayong, Hye Sun Na, Allison M. Okamura
AGILEDC
2006
IEEE
14 years 4 months ago
Refactoring with Contracts
Design by contract is a practical methodology for developing code together with its specification. The contract consists of class invariants and method preand postconditions. As ...
Maayan Goldstein, Yishai A. Feldman, Shmuel S. Tys...
WACV
2005
IEEE
14 years 3 months ago
Multi-Scale 3D Scene Flow from Binocular Stereo Sequences
Scene flow methods estimate the three-dimensional motion field for points in the world, using multi-camera video data. Such methods combine multi-view reconstruction with motion...
Rui Li, Stan Sclaroff
ASPDAC
2007
ACM
124views Hardware» more  ASPDAC 2007»
14 years 2 months ago
BddCut: Towards Scalable Symbolic Cut Enumeration
While the covering algorithm has been perfected recently by the iterative approaches, such as DAOmap and IMap, its application has been limited to technology mapping. The main fact...
Andrew C. Ling, Jianwen Zhu, Stephen Dean Brown