Results 81 to 90 of about 6,802 (157)

An Efficient and Accurate UAV State Estimation Method with Multi-LiDAR–IMU–Camera Fusion

open access: yesDrones
State estimation plays a vital role in UAV navigation and control. With the continuous decrease in sensor cost and size, UAVs equipped with multiple LiDARs, Inertial Measurement Units (IMUs), and cameras have attracted increasing attention.
Junfeng Ding   +5 more
doaj   +1 more source

Examining I2P Resilience: Effect of Centrality-based Attack

open access: yes
This study examines the robustness of I2P, a well-regarded anonymous and decentralized peer-to-peer network designed to ensure anonymity, confidentiality, and circumvention of censorship. Unlike its more widely researched counterpart, TOR, I2P's resilience has received less scholarly attention.
Akanbi, Kemi   +3 more
openaire   +2 more sources

Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security

open access: yesProceedings of the 1st International Conference on Information Systems Security and Privacy, 2015
Anonymous communications are growing extremely fast because more and more Internet users employ anonymous systems, such as the I2P or Tor networks, as a way to hide their online activity. Therefore, these networks have been more and more studied, mainly from a security point of view.
Timpanaro, Juan Pablo   +3 more
openaire   +2 more sources

Combining Column Generation and Lagrangian Relaxation [PDF]

open access: yes
Although the possibility to combine column generation and Lagrangian relaxation has been known for quite some time, it has only recently been exploited in algorithms. In this paper, we discuss ways of combining these techniques.
Huisman, D.   +3 more
core   +1 more source

I2P, X-Files season 10, video game writing credits (Historiography V:3)

open access: yes, 2022
Computer science and technology : historiography V (3)
openaire   +1 more source

Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P

open access: yesInternet Histories, 2019
Few books approach the dark web without leaving the reader with a mystified understanding of it.
openaire   +2 more sources

CA-I2P: Channel-Adaptive Registration Network with Global Optimal Selection

open access: yes
Detection-free methods typically follow a coarse-to-fine pipeline, extracting image and point cloud features for patch-level matching and refining dense pixel-to-point correspondences. However, differences in feature channel attention between images and point clouds may lead to degraded matching results, ultimately impairing registration accuracy ...
Cheng, Zhixin   +7 more
openaire   +2 more sources

Tor/I2P narkotikus platinančių svetainių veiklos ir prieinamumo Lietuvoje kriminologinė analizė

open access: yes, 2021
Narkotikų platinimo problema jau egzistuoja ilgą laiko tarpą. Robertas Merton‘as nusikaltimą matė kaip normalų dalyką visuomenėje, nes ,jo manymu, asmenys gyvenantys konkurencingoje, materialistinėje visuomenėje, ne visada galės išgyventi užsiimdami legalia veikla. „Pažeidėjai pagal Mertoną yra novatoriai, nes bando nesankcionuotomis ar baudžiamosiomis
openaire   +1 more source

Diff$^2$I2P: Differentiable Image-to-Point Cloud Registration with Diffusion Prior

open access: yes
ICCV ...
Mu, Juncheng   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy