Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a static set of l legitimate users, then all traitors can be identified given the pirate key ...
We introduce a novel bio-inspired odor source localization algorithm (surge- cast) for environments with a main wind flow and compare it to two well-known algorithms. With all three algorithms, systematic experiments with real robots are carried out in a wi ...
In nature strong colors play an important role in scaring away predators or finding a mate. Often, the strongest and brightest colors arise from coherent scattering and reflection on periodic structures on a length scale of several micro- or nanometers. Un ...