Sciweavers

11234 search results - page 2015 / 2247
» A Microsurgery Simulation System
Sort
View
131
Voted
CORR
2008
Springer
106views Education» more  CORR 2008»
15 years 3 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
CORR
2008
Springer
97views Education» more  CORR 2008»
15 years 3 months ago
Efficient Algorithms and Routing Protocols for Handling Transient Single Node Failures
Single node failures represent more than 85% of all node failures in the today's large communication networks such as the Internet [10]. Also, these node failures are usually...
Amit M. Bhosle, Teofilo F. Gonzalez
CORR
2008
Springer
108views Education» more  CORR 2008»
15 years 3 months ago
Linear Processing and Sum Throughput in the Multiuser MIMO Downlink
We consider linear precoding and decoding in the downlink of a multiuser multiple-input, multipleoutput (MIMO) system, wherein each user may receive more than one data stream. We ...
Adam J. Tenenbaum, Raviraj S. Adve
ADHOC
2006
113views more  ADHOC 2006»
15 years 3 months ago
Positioning using local maps
ct 9 It is often useful to know the positions of nodes in a network. However, in a large network it is impractical to build a 10 single global map. In this paper, we present a new ...
Yi Shang, Wheeler Ruml, Markus P. J. Fromherz
116
Voted
ENTCS
2008
120views more  ENTCS 2008»
15 years 3 months ago
Specifying and Executing Reactive Scenarios With Lutin
This paper presents the language Lutin and its operational semantics. This language specifically targets the domain of reactive systems, where an execution is a (virtually) infini...
Pascal Raymond, Yvan Roux, Erwan Jahier
« Prev « First page 2015 / 2247 Last » Next »