Sciweavers

CORR
2008
Springer
87views Education» more  CORR 2008»
13 years 4 months ago
Portable Valve-less Peristaltic Micro-pump Design and Fabrication
This paper is to describe a design and fabrication method for a valve-less peristaltic micro-pump. The valve-less peristaltic micro-pump with three membrane chambers in a serial is...
H. Yang, T.-H. Tsai, C.-C. Hu
CORR
2008
Springer
64views Education» more  CORR 2008»
13 years 4 months ago
Study of mechanical response in embossing of ceramic green substrate by micro-indentation
Micro-indentation test with a micro flat-end cone indenter was employed to simulate micro embossing process and investigate the thermo-mechanical response of ceramic green substrat...
Y. C. Liu, X. C. Shan
CORR
2008
Springer
64views Education» more  CORR 2008»
13 years 4 months ago
UV Direct-Writing of Metals on Polyimide
Conductive micro-patterned copper tracks were fabricated by UV direct-writing of a nanoparticle silver seed layer followed by selective electroless copper deposition. Silver ions w...
Jack Hoyd-Gigg Ng, Marc P. Y. Desmulliez, Aongus M...
CORR
2008
Springer
93views Education» more  CORR 2008»
13 years 4 months ago
Design And Fabrication of Condenser Microphone Using Wafer Transfer And Micro-electroplating Technique
A novel fabrication process, which uses wafer transfer and micro-electroplating technique, has been proposed and tested. In this paper, the effects of the diaphragm thickness and s...
Zhen-Zhun Shu, Ming-Li Ke, Guan-Wei Chen, Ray Hua ...
CORR
2008
Springer
110views Education» more  CORR 2008»
13 years 4 months ago
The Tractability of Model-Checking for LTL: The Good, the Bad, and the Ugly Fragments
In a seminal paper from 1985, Sistla and Clarke showed that the model-checking problem for Linear Temporal Logic (LTL) is either NP-complete or PSPACE-complete, depending on the se...
Michael Bauland, Martin Mundhenk, Thomas Schneider...
CORR
2008
Springer
78views Education» more  CORR 2008»
13 years 4 months ago
Wireless Secrecy in Cellular Systems with Infrastructure--Aided Cooperation
In cellular systems, confidentiality of uplink transmission with respect to eavesdropping terminals can be ensured by creating intentional interference via scheduling of concurren...
Petar Popovski, Osvaldo Simeone
CORR
2008
Springer
127views Education» more  CORR 2008»
13 years 4 months ago
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
The Sybil attack in unknown port networks such as wireless is not considered tractable. A wireless node is not capable of independently differentiating the universe of real nodes f...
Adnan Vora, Mikhail Nesterenko, Sébastien T...
CORR
2008
Springer
76views Education» more  CORR 2008»
13 years 4 months ago
Measurement of Large Forces and Deflections in Microstructures
Properties of typical MEMS materials have been widely investigated. Mechanical properties of MEMS structures depend not only on the bulk material properties, but also structural fa...
Kai Axel Hals, Einar Halvorsen, Xuyuan Chen
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 4 months ago
Decentralized Search with Random Costs
A decentralized search algorithm is a method of routing on a random graph that uses only limited, local, information about the realization of the graph. In some random graph model...
Oskar Sandberg
CORR
2008
Springer
117views Education» more  CORR 2008»
13 years 4 months ago
Low-Complexity LDPC Codes with Near-Optimum Performance over the BEC
Recent works showed how low-density parity-check (LDPC) erasure correcting codes, under maximum likelihood (ML) decoding, are capable of tightly approaching the performance of an i...
Enrico Paolini, Gianluigi Liva, Michela Varrella, ...