Sciweavers

1809 search results - page 278 / 362
» Weakly Computable Real Numbers
Sort
View
ICALP
2005
Springer
14 years 2 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
MIRRORBOT
2005
Springer
154views Robotics» more  MIRRORBOT 2005»
14 years 2 months ago
Spatial Representation and Navigation in a Bio-inspired Robot
Abstract. A biologically inspired computational model of rodent representation–based (locale) navigation is presented. The model combines visual input in the form of realistic tw...
Denis Sheynikhovich, Ricardo Chavarriaga, Thomas S...
RAID
2005
Springer
14 years 2 months ago
Empirical Analysis of Rate Limiting Mechanisms
One class of worm defense techniques that received attention of late is to “rate limit” outbound traffic to contain fast spreading worms. Several proposals of rate limiting t...
Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi W...
SCALESPACE
2005
Springer
14 years 2 months ago
Vortex and Source Particles for Fluid Motion Estimation
In this paper we propose a new motion estimator for image sequences depicting fluid flows. The proposed estimator is based on the Helmholtz decomposition of vector fields. This ...
Anne Cuzol, Étienne Mémin
ATAL
2005
Springer
14 years 2 months ago
AmbieAgents: a scalable infrastructure for mobile and context-aware information services
Context-aware information systems for mobile users have to cope with a variety of requirements in order to be able to provide an added value that goes beyond simply location-based...
Till Christopher Lech, Leendert W. M. Wienhofen