Sciweavers

4383 search results - page 855 / 877
» Mobile Environmental Applications
Sort
View
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
15 years 3 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima
TELETRAFFIC
2007
Springer
15 years 3 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan
ICRA
2006
IEEE
225views Robotics» more  ICRA 2006»
15 years 3 months ago
Constraint Optimization Coordination Architecture for Search and Rescue Robotics
— The dangerous and time sensitive nature of a disaster area makes it an ideal application for robotic exploration. Our long term goal is to enable humans, software agents, and a...
Mary Koes, Illah R. Nourbakhsh, Katia P. Sycara
ICRA
2006
IEEE
119views Robotics» more  ICRA 2006»
15 years 3 months ago
Outdoor SLAM using Visual Appearance and Laser Ranging
— This paper describes a 3D SLAM system using information from an actuated laser scanner and camera installed on a mobile robot.The laser samples the local geometry of the enviro...
Paul M. Newman, David M. Cole, Kin Leong Ho
ISCA
2006
IEEE
154views Hardware» more  ISCA 2006»
15 years 3 months ago
SODA: A Low-power Architecture For Software Radio
The physical layer of most wireless protocols is traditionally implemented in custom hardware to satisfy the heavy computational requirements while keeping power consumption to a ...
Yuan Lin, Hyunseok Lee, Mark Woh, Yoav Harel, Scot...