• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 819
Next 10 →

Differential Cryptanalysis of DES-like Cryptosystems

by Eli Biham, Adi Shamir - CRYPTO'91 , 1991
"... The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Buraeu of Standards in the mid 70's, and has successfully withstood all the attacks published so far in the open literature. In t ..."
Abstract - Cited by 676 (9 self) - Add to MetaCart
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Buraeu of Standards in the mid 70's, and has successfully withstood all the attacks published so far in the open literature

Near infrared imaging for multi-polar civilian applications

by A. Ebeid, S. Rott, E. Talmy, C. Ibarra-castanedo, A. Bendada, X. Maldague
"... Infrared can be referred to any type of invisible electromagnetic spectrum having radiation wavelengths above the visible band and below the microwave band. We can define the near-infrared (NIR- approximately from 0.78 to 2.2 µm) as the band located between the visible and the mid-wave infrared (MWI ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
(MWIR approximately from 3 to 5 µm).Nowadays, there are many applications where the NIR band is used. Some of them are biometrics, face recognition, surveillance and security, and biotechnology, among many others. In this paper, we present some of these applications using two NIR cameras: (1) a highend

Role-Based Access Control

by David Ferraiolo, Richard Kuhn - In 15th NIST-NCSC National Computer Security Conference , 1992
"... While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of a ..."
Abstract - Cited by 477 (6 self) - Add to MetaCart
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method

Distributed Simulation Based on the High Level Architecture in Civilian Application Domains

by Steffen Straßburger , 2001
"... ..."
Abstract - Cited by 19 (1 self) - Add to MetaCart
Abstract not found

Portable Long-Wavelength Infrared Camera For Civilian Applications S.

by Krabach Bandara And, S. D. Gunapala, T. N. Krabach, J. K. Liu
"... A 9 pm cutoff 256x256 hand-held quantum well infrared photodetector camera has been demonstrated. Excellent imagery, with a noise equivalent differential temperature (NEAT) of 26 has been achieved. In this paper, we discuss the performance of this portable long-wavelength infrared camera in quantum ..."
Abstract - Add to MetaCart
efficiency, NEAT, minimum resolvable temperature difference uniformity, etc. and its applications in science, medicine and defense. Introduction There are myriad applications that require long-wavelength, large, uniform, reproducible, low cost, steady, low power dissipation, and radiation hard infrared

Civilian Applications and Policy Implications of Commercial Unmanned Aerial Vehicles

by Kara Lynn Sprague, Eric Feron, Dava J. Newman, Kara Lynn Sprague , 2004
"... Certified by……………………………………………………………………………………………………………... ..."
Abstract - Add to MetaCart
Certified by……………………………………………………………………………………………………………...

A MOTION PLATFORM INTEGRATED UAV PILOT TRAINING AND EVALUATION SYSTEM FOR FUTURE CIVILIAN APPLICATIONS

by James T. Hing, Paul Y. Oh
"... The potential for UAVs to benefit the civilian consumer is driving the demand for the integration of these vehicles into the national airspace. With UAV accidents occurring at a signif-icantly higher rate than commercial airlines, the urgent issue becomes designing systems and protocols that can pre ..."
Abstract - Add to MetaCart
The potential for UAVs to benefit the civilian consumer is driving the demand for the integration of these vehicles into the national airspace. With UAV accidents occurring at a signif-icantly higher rate than commercial airlines, the urgent issue becomes designing systems and protocols that can

On-line Fingerprint Verification

by Anil Jain, Lin Hong, Ruud Bolle - IEEE Transactions on Pattern Analysis and Machine Intelligence , 1997
"... Abstract—Fingerprint verification is one of the most reliable personal identification methods. However, manual fingerprint verification is so tedious, time-consuming, and expensive that it is incapable of meeting today’s increasing performance requirements. An automatic fingerprint identification sy ..."
Abstract - Cited by 300 (32 self) - Add to MetaCart
system (AFIS) is widely needed. It plays a very important role in forensic and civilian applications such as criminal identification, access control, and ATM card verification. This paper describes the design and implementation of an on-line fingerprint verification system which operates in two stages

The T-Wing: A VTOL UAV for defense and civilian applications, Flight Internationals UAV Australia conference proceedings, 8–9 February 2001

by R. H. Stone, G. Clarke
"... This paper describes progress made on the T-Wing tail-sitter UAV programme currently being undertaken via a collaborative research agreement between Sonacom Pty Ltd and the University of Sydney. This vehicle is being developed in response to a perceived requirement for a more flexible surveillance a ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
This paper describes progress made on the T-Wing tail-sitter UAV programme currently being undertaken via a collaborative research agreement between Sonacom Pty Ltd and the University of Sydney. This vehicle is being developed in response to a perceived requirement for a more flexible surveillance and remote sensing platform than is currently available. Missions for such a platform include coastal surveillance, defence intelligence gathering and environmental monitoring. The use of an unmanned air-vehicle (UAV) with a vertical take-off and landing (VTOL) capability that can still enjoy efficient horizontal flight promises significant advantages over other vehicles for such missions. One immediate advantage is the potential to operate from small patrol craft and frigates equipped with helipads. In this role such a vehicle could be used for maritime surveillance; sonobuoy or other store deployment; communication relay; convoy protection; and support for ground and helicopter operations. The programme currently being undertaken involves building a 50-lb fully autonomous VTOL tail-sitter UAV to demonstrate successful operation near the ground in windy conditions and to perform the transition maneuvers between vertical and horizontal flight. This will then allow the development of a full-size prototype vehicle, (The “Mirli”) to be undertaken as a prelude to commercial production.

CIVILIAN TITLES

by unknown authors
"... Applicant for appointment as: ..."
Abstract - Add to MetaCart
Applicant for appointment as:
Next 10 →
Results 1 - 10 of 819
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University