Sciweavers

8093 search results - page 1510 / 1619
» Design optimization
Sort
View
161
Voted
ESAS
2004
Springer
15 years 10 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
INFOCOM
2003
IEEE
15 years 10 months ago
Static and Dynamic Analysis of the Internet's Susceptibility to Faults and Attacks
— We analyze the susceptibility of the Internet to random faults, malicious attacks, and mixtures of faults and attacks. We analyze actual Internet data, as well as simulated dat...
Seung-Taek Park, Alexy Khrabrov, David M. Pennock,...
AUTOMATICA
2007
238views more  AUTOMATICA 2007»
15 years 5 months ago
Fundamental limit of discrete-time systems in tracking multi-tone sinusoidal signals
This paper studies the tracking performance of linear time-invariant multi-variable discrete-time systems. The specific problem under consideration is to track a multi-tone sinus...
Weizhou Su, Li Qiu, Jie Chen
TSP
2008
118views more  TSP 2008»
15 years 4 months ago
Channel-Aware Random Access Control for Distributed Estimation in Sensor Networks
A cross-layered slotted ALOHA protocol is proposed and analyzed for distributed estimation in sensor networks. Suppose that the sensors in the network record local measurements of ...
Y.-W. P. Hong, Keng-U Lei, Chong-Yung Chi
CGF
2004
133views more  CGF 2004»
15 years 4 months ago
SMARTPAPER: An Interactive and User Friendly Sketching System
This paper describes an interactive sketching system for 3D design/modeling that diverts from the conventional menu and button interfaces of CAD tools. The system, dubbed SMARTPAP...
Amit Shesh, Baoquan Chen
« Prev « First page 1510 / 1619 Last » Next »