Sciweavers

3812 search results - page 2 / 763
» Combinations of TRAP Based Systems
Sort
View
SAC
2010
ACM
14 years 18 days ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...
RAID
1999
Springer
13 years 10 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
ICIAR
2010
Springer
13 years 10 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
ICRA
2008
IEEE
105views Robotics» more  ICRA 2008»
14 years 6 days ago
A new framework for microrobotic control of motile cells based on high-speed tracking and focusing
— We propose a new framework and novel visual control system for motile cells in three-dimensional (3-D) space. Our goal is to utilize microorganisms as micro-robots in various a...
Takeshi Hasegawa, Naoko Ogawa, Hiromasa Oku, Masat...
ATVA
2008
Springer
139views Hardware» more  ATVA 2008»
13 years 7 months ago
Compositional Verification for Component-Based Systems and Application
We present a compositional method for the verification of component-based systems described in a subset of the BIP language encompassing multi-party interaction without data transf...
Saddek Bensalem, Marius Bozga, Joseph Sifakis, Tha...