Sciweavers

230 search results - page 18 / 46
» Type Derivation Using the Projection Operation
Sort
View
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 2 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
IVC
2006
156views more  IVC 2006»
13 years 7 months ago
Image encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques.Inthis communication,weproposea ...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud
MVA
1990
133views Computer Vision» more  MVA 1990»
13 years 9 months ago
Using and Generating Environment Models for Indoor Mobile Robots
An autonomous mobile robot must be able to combine uncertain sensory information with prior knowledge of the world. Moreover, these operations have to be performed fast enough for...
Yuval Roth-Tabak, Terry E. Weymouth
OTM
2005
Springer
14 years 1 months ago
Ontology-Based Spatial Query Expansion in Information Retrieval
Ontologies play a key role in Semantic Web research. A common use of ontologies in Semantic Web is to enrich the current Web resources with some well-defined meaning to enhance th...
Gaihua Fu, Christopher B. Jones, Alia I. Abdelmoty
CTRSA
2006
Springer
183views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Efficient Doubling on Genus 3 Curves over Binary Fields
The most important and expensive operation in a hyperelliptic curve cryptosystem (HECC) is scalar multiplication by an integer k, i.e., computing an integer k times a divisor D on ...
Xinxin Fan, Thomas J. Wollinger, Yumin Wang