Sciweavers

2255 search results - page 309 / 451
» Computing a Center-Transversal Line
Sort
View
HOTOS
2003
IEEE
15 years 4 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
ICRA
2003
IEEE
116views Robotics» more  ICRA 2003»
15 years 4 months ago
The sway compensation trajectory for a biped robot
From 1970’s, legged robots have attracted much attention of many researchers. In spite of this, it has been regarded that dynamically stable walking is very difficult to be tac...
Ryo Kurazume, Tsutomu Hasegawa, Kan Yoneda
LCN
2003
IEEE
15 years 4 months ago
Regional Gossip Routing for Wireless Ad Hoc Networks
Abstract—Many routing protocols have been proposed for wireless ad hoc networks, and most of them are based on some variants of flooding. Thus many routing messages are propagat...
Xiang-Yang Li, Kousha Moaveninejad, Ophir Frieder
DIALM
2003
ACM
99views Algorithms» more  DIALM 2003»
15 years 4 months ago
Spatio-temporal data reduction with deterministic error bounds
A common way of storing spatio-temporal information about mobile devices is in the form of a 3D (2D geography + time) trajectory. We argue that when cellular phones and Personal D...
Hu Cao, Ouri Wolfson, Goce Trajcevski
WSNA
2003
ACM
15 years 4 months ago
Asymptotically optimal time synchronization in dense sensor networks
We consider the problem of synchronization of all clocks in a sensor network, in the regime of asymptotically high node densities. We formulate this problem as one in which all cl...
An-Swol Hu, Sergio D. Servetto