Sciweavers

479 search results - page 95 / 96
» How does a box work
Sort
View
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
13 years 4 months ago
Movement templates for learning of hitting and batting
Abstract— Hitting and batting tasks, such as tennis forehands, ping-pong strokes, or baseball batting, depend on predictions where the ball can be intercepted and how it can prop...
Jens Kober, Katharina Mülling, Oliver Kroemer...
SCN
2010
Springer
138views Communications» more  SCN 2010»
13 years 4 months ago
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
In this work, we consider Authentication and Key Agreement (AKA), a popular client-server Key Exchange (KE) protocol, commonly used in wireless standards (e.g., UMTS), and widely c...
Vladimir Kolesnikov
FPL
2010
Springer
124views Hardware» more  FPL 2010»
13 years 4 months ago
Finding System-Level Information and Analyzing Its Correlation to FPGA Placement
One of the more popular placement algorithms for Field Programmable Gate Arrays (FPGAs) is called Simulated Annealing (SA). This algorithm tries to create a good quality placement ...
Farnaz Gharibian, Lesley Shannon, Peter Jamieson
MOBIHOC
2010
ACM
13 years 3 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
COLING
2010
13 years 1 months ago
Contextual Recommendation based on Text Mining
The potential benefit of integrating contextual information for recommendation has received much research attention recently, especially with the ever-increasing interest in mobil...
Yize Li, Jiazhong Nie, Yi Zhang, Bingqing Wang, Ba...