Sciweavers

3168 search results - page 533 / 634
» Computing Event Dependencies in System Designs and Programs
Sort
View
IWCMC
2009
ACM
15 years 11 months ago
Joint turbo equalization for relaying schemes over frequency-selective fading channels
We propose a single carrier joint frequency domain equalization and interference cancellation (FDE-IC) with diversity combining for different relaying schemes. We consider amplif...
Houda Chafnaji, Tarik Ait-Idir, Halim Yanikomerogl...
SASN
2005
ACM
15 years 10 months ago
Coordinated sensor deployment for improving secure communications and sensing coverage
Sensor network has a great potential in applications such as habitat monitoring, wildlife tracking, building surveillance, and military combat. The design of a sensor network syst...
Yinian Mao, Min Wu
ICICS
2001
Springer
15 years 9 months ago
Enforcing Obligation with Security Monitors
With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressive...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 4 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
ICRA
2005
IEEE
103views Robotics» more  ICRA 2005»
15 years 10 months ago
Dimensioning a Constrained Parallel Robot to Reach a Set of Task Positions
— The paper considers the problem of setting the dimensions of a system of constrained parallel robots to ensure that together they can position an end-effector in a specified s...
Hai-Jun Su, J. Michael McCarthy