Sciweavers

628 search results - page 85 / 126
» Designing the perfect auction
Sort
View
CORR
2010
Springer
102views Education» more  CORR 2010»
14 years 12 months ago
How to prevent type-flaw and multi-protocol attacks on security protocols under Exclusive-OR
Type-flaw attacks and multi-protocol attacks on security protocols have been frequently reported in the literature. Heather et al. and Guttman et al. proved that these could be pr...
Sreekanth Malladi
CORR
2008
Springer
112views Education» more  CORR 2008»
14 years 12 months ago
Distributed Estimation over Wireless Sensor Networks with Packet Losses
A distributed adaptive algorithm to estimate a time-varying signal, measured by a wireless sensor network, is designed and analyzed. The presence of measurement noises and of packe...
Carlo Fischione, Alberto Speranzon, Karl Henrik Jo...
BMCBI
2006
159views more  BMCBI 2006»
14 years 12 months ago
ProtRepeatsDB: a database of amino acid repeats in genomes
Background: Genome wide and cross species comparisons of amino acid repeats is an intriguing problem in biology mainly due to the highly polymorphic nature and diverse functions o...
Mridul K. Kalita, Gowthaman Ramasamy, Sekhar Durai...
TROB
2008
102views more  TROB 2008»
14 years 11 months ago
Lower Extremity Exoskeletons and Active Orthoses: Challenges and State-of-the-Art
In the nearly six decades since researchers began to explore methods of creating them, exoskeletons have progressed from the stuff of science fiction to nearly commercialized produ...
Aaron M. Dollar, Hugh M. Herr
CORR
2008
Springer
62views Education» more  CORR 2008»
14 years 11 months ago
A complete study of electroactive polymers for energy scavenging: modelling and experiments
Recent progresses in ultra low power microelectronics propelled the development of several microsensors and particularly the self powered microsystems (SPMS). One of their limitat...
C. Jean-Mistral, S. Basrour, J. J. Chaillout, A. B...