Sciweavers

JCS
2011
91views more  JCS 2011»
13 years 5 months ago
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
Gildas Avoine, Muhammed Ali Bingöl, Süle...
USS
2010
13 years 8 months ago
Realization of RF Distance Bounding
One of the main obstacles for the wider deployment of radio (RF) distance bounding is the lack of platforms that implement these protocols. We address this problem and we build a ...
Kasper Bonne Rasmussen, Srdjan Capkun
JSYML
2008
63views more  JSYML 2008»
13 years 10 months ago
Classifying model-theoretic properties
In 2004 Csima, Hirschfeldt, Knight, and Soare [1] showed that a set A T 0 is nonlow2 if and only if A is prime bounding, i.e. for every complete atomic decidable theory T , there i...
Chris J. Conidis
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 10 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...
CG
2008
Springer
13 years 10 months ago
Fast, parallel, and asynchronous construction of BVHs for ray tracing animated scenes
Recent developments have produced several techniques for interactive ray tracing of dynamic scenes. In particular, bounding volume hierarchies (BVHs) are efficient acceleration st...
Ingo Wald, Thiago Ize, Steven G. Parker
GMP
2008
IEEE
192views Solid Modeling» more  GMP 2008»
13 years 11 months ago
Efficient Collision Detection Using a Dual Bounding Volume Hierarchy
We perform collision detection between static rigid objects using a bounding volume hierarchy which consists of an oriented bounding box (OBB) tree enhanced with bounding spheres. ...
Jung-Woo Chang, Wenping Wang, Myung-Soo Kim
CCS
2008
ACM
14 years 21 days ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
IROS
2006
IEEE
160views Robotics» more  IROS 2006»
14 years 4 months ago
Bounding Gait in a Hybrid Wheeled-Leg Robot
— This paper discusses the first implementation of a dynamically stable bounding gait on a hybrid wheeled-leg robot. Design of the robot is reviewed and the controllers which al...
James Andrew Smith, Inna Sharf, Michael Trentini
CCS
2007
ACM
14 years 4 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
LION
2009
Springer
210views Optimization» more  LION 2009»
14 years 5 months ago
Beam-ACO Based on Stochastic Sampling: A Case Study on the TSP with Time Windows
Beam-ACO algorithms are hybrid methods that combine the metaheuristic ant colony optimization with beam search. They heavily rely on accurate and computationally inexpensive boundi...
Manuel López-Ibáñez, Christia...