Sciweavers

3820 search results - page 622 / 764
» Bounded Model Debugging
Sort
View
ICASSP
2008
IEEE
15 years 8 months ago
On security-aware transmission scheduling
The problem of interest is to characterize to what extent nodes independently following certain transmission schedules can be hijacked to relay flows of information packets. Info...
Ting He, Ameya Agaskar, Lang Tong
ICASSP
2008
IEEE
15 years 8 months ago
Link throughput of multi-channel opportunistic access with limited sensing
—We aim to characterize the maximum link throughput of a multi-channel opportunistic communication system. The states of these channels evolve as independent and identically dist...
Keqin Liu, Qing Zhao
ICDCS
2008
IEEE
15 years 8 months ago
Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks
Wireless sensor networks (WSNs) deployed for missioncritical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes w...
Guoliang Xing, Jianping Wang, Ke Shen, Qingfeng Hu...
89
Voted
ICRA
2008
IEEE
104views Robotics» more  ICRA 2008»
15 years 8 months ago
High performance control for graceful motion of an intelligent wheelchair
— To be acceptable to human drivers, the motion of an intelligent robotic wheelchair must be more than just collision-free: it must be graceful. We define graceful motion as bei...
Shilpa Gulati, Benjamin Kuipers
IROS
2008
IEEE
130views Robotics» more  IROS 2008»
15 years 8 months ago
Energy based path planning for a novel cabled robotic system
— Cabled robotic systems have been used for a diverse set of applications such as environmental sensing, search and rescue, sports and entertainment and air vehicle simulators. I...
Per Henrik Borgstrom, Amarjeet Singh 0003, Brett L...