Sciweavers

343 search results - page 56 / 69
» Normal State Implicature
Sort
View
IJNSEC
2007
122views more  IJNSEC 2007»
14 years 9 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
60
Voted
TCOM
2008
63views more  TCOM 2008»
14 years 9 months ago
A general construction of constrained parity-check codes for optical recording
This paper proposes a general and systematic code design method to efficiently combine constrained codes with parity-check (PC) codes for optical recording. The proposed constraine...
Kui Cai, Kees A. Schouhamer Immink
AR
2002
113views more  AR 2002»
14 years 9 months ago
Final-state control of a two-link cat robot
: This paper deals with twisting motion of a falling cat robot by two torque inputs around her waist. The cat robot consists of two rigid columns and has internally two actuators a...
Zhiqiang Weng, Hidekazu Nishimura
SIAMAM
2000
79views more  SIAMAM 2000»
14 years 9 months ago
A Mathematical Model for Spatially Varying Extracellular Matrix Alignment
Orientation of extracellular matrix fibers in the skin is a key ingredient of tissue appearance and function, and differences in fiber alignment are one of the main distinctions be...
John C. Dallon, Jonathan A. Sherratt
TWC
2008
142views more  TWC 2008»
14 years 9 months ago
Robust Ultra-Wideband Signal Acquisition
Ultra-wideband (UWB) communication is envisaged to be deployed in indoor environments, where the noise distribution is decidedly non-Gaussian. A critical challenge for impulse radi...
Ersen Ekrem, Mutlu Koca, Hakan Deliç