Sciweavers

18090 search results - page 3465 / 3618
» Computing by Only Observing
Sort
View
ICNP
2006
IEEE
15 years 10 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
ICNP
2006
IEEE
15 years 10 months ago
RAIN: A Reliable Wireless Network Architecture
Abstract— Despite years of research and development, pioneering deployments of multihop wireless networks have not proven successful. The performance of routing and transport is ...
Chaegwon Lim, Haiyun Luo, Chong-Ho Choi
ICNP
2006
IEEE
15 years 10 months ago
O-MAC: A Receiver Centric Power Management Protocol
— Energy efficiency is widely understood to be one of the dominant considerations for Wireless Sensor Networks. Based on historical data and technology trends, the receiver ener...
Hui Cao, Ken Parker, Anish Arora
ICRA
2006
IEEE
136views Robotics» more  ICRA 2006»
15 years 10 months ago
Fault Detection for Mobile Robots using Redundant Positioning Systems
— Reliable navigation is a very important part of an autonomous mobile robot system. This means for instance that the robot should not lose track of its position, even if unexpec...
Paul Sundvall, Patric Jensfelt
IISWC
2006
IEEE
15 years 10 months ago
Comparing Benchmarks Using Key Microarchitecture-Independent Characteristics
— Understanding the behavior of emerging workloads is important for designing next generation microprocessors. For addressing this issue, computer architects and performance anal...
Kenneth Hoste, Lieven Eeckhout
« Prev « First page 3465 / 3618 Last » Next »