Sciweavers

2432 search results - page 450 / 487
» Degrees and choice numbers
Sort
View
ICASSP
2008
IEEE
15 years 8 months ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig
SECON
2008
IEEE
15 years 8 months ago
Enhancing the Data Collection Rate of Tree-Based Aggregation in Wireless Sensor Networks
— What is the fastest rate at which we can collect a stream of aggregated data from a set of wireless sensors organized as a tree? We explore a hierarchy of techniques using real...
Özlem Durmaz Incel, Bhaskar Krishnamachari
ICC
2007
IEEE
15 years 8 months ago
Using Resource Pools for Pre-Signaled Restoration LSP in ASON Networks
— When considering network restoration, the amount of reserved resources has an important impact on network performance in that it can restrict the acceptance of new connections....
Florence Kolberg, David Harle
IROS
2007
IEEE
128views Robotics» more  IROS 2007»
15 years 8 months ago
EMG-based teleoperation of a robot arm using low-dimensional representation
Abstract— In robot teleoperation scenarios, the interface between the user and the robot is undoubtedly of high importance. In this paper, electromyographic (EMG) signals from mu...
Panagiotis K. Artemiadis, Kostas J. Kyriakopoulos
TPHOL
2007
IEEE
15 years 8 months ago
Verifying Nonlinear Real Formulas Via Sums of Squares
Techniques based on sums of squares appear promising as a general approach to the universal theory of reals with addition and multiplication, i.e. verifying Boolean combinations of...
John Harrison