Sciweavers

20638 search results - page 3926 / 4128
» Computer Networks
Sort
View
COMCOM
2008
91views more  COMCOM 2008»
15 years 2 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CORR
2010
Springer
148views Education» more  CORR 2010»
15 years 2 months ago
Data Sharing Options for Scientific Workflows on Amazon EC2
Efficient data management is a key component in achieving good performance for scientific workflows in distributed environments. Workflow applications typically communicate data be...
Gideon Juve, Ewa Deelman, Karan Vahi, Gaurang Meht...
107
Voted
CORR
2008
Springer
105views Education» more  CORR 2008»
15 years 2 months ago
Integrating OPC Data into GSN Infrastructures
This paper presents the design and the implementation of an interface software component between OLE for Process Control (OPC) formatted data and the Global ...
Olivier Passalacqua, Eric Benoit, Marc-Philippe Hu...
CVIU
2010
115views more  CVIU 2010»
15 years 2 months ago
A modified model for the Lobula Giant Movement Detector and its FPGA implementation
Bio-inspired vision sensors are particularly appropriate candidates for navigation of vehicles or mobile robots due to their computational simplicity, allowing compact hardware im...
Hongying Meng, Kofi Appiah, Shigang Yue, Andrew Hu...
181
Voted
AUTOMATICA
2006
140views more  AUTOMATICA 2006»
15 years 2 months ago
On a stochastic sensor selection algorithm with applications in sensor scheduling and sensor coverage
In this note we consider the following problem. Suppose a set of sensors is jointly trying to estimate a process. One sensor takes a measurement at every time step and the measure...
Vijay Gupta, Timothy H. Chung, Babak Hassibi, Rich...
« Prev « First page 3926 / 4128 Last » Next »