Sciweavers

1215 search results - page 122 / 243
» Testing in the Distributed Test Architecture: An Extended Ab...
Sort
View
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 9 months ago
Automatic Verification of Correspondences for Security Protocols
We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully auto...
Bruno Blanchet
JCT
2008
81views more  JCT 2008»
13 years 9 months ago
Algebraic characterization of uniquely vertex colorable graphs
Abstract. The study of graph vertex colorability from an algebraic perspective has introduced novel techniques and algorithms into the field. For instance, it is known that k-color...
Christopher J. Hillar, Troels Windfeldt
JSCIC
2008
129views more  JSCIC 2008»
13 years 9 months ago
Level Set Equations on Surfaces via the Closest Point Method
Abstract Level set methods have been used in a great number of applications in R2 and R3 and it is natural to consider extending some of these methods to problems defined on surfac...
Colin B. Macdonald, Steven J. Ruuth
TSP
2008
99views more  TSP 2008»
13 years 8 months ago
An ABORT-Like Detector With Improved Mismatched Signals Rejection Capabilities
Abstract--In this paper we present a GLRT-based adaptive detection algorithm for extended targets with improved rejection capabilities of mismatched signals. We assume that a set o...
Francesco Bandiera, Olivier Besson, Giuseppe Ricci
ICRA
2010
IEEE
114views Robotics» more  ICRA 2010»
13 years 7 months ago
Navigating multiple simple-airplanes in 3D workspace
Abstract— We present an algorithm for collision-free navigation of multiple flying robots in three-dimensional workspace. Our approach extends the model of a simple car to a sim...
Jamie Snape, Dinesh Manocha