Abstract— The most widely applied resource allocation strategy is to balance, or equalize, the total workload assigned to each resource. In mobile multi-agent systems, this princ...
Marco Pavone, Alessandro Arsie, Emilio Frazzoli, F...
— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
—The central paradigm of today’s successful Internet is to keep the network core simple and move complexity towards the network end points. Unfortunately, this very paradigm li...
This paper presents an oblivious real-time video watermarking scheme in which extended m-sequences is selected as watermark pattern. The good balance property of extended m-sequen...
— We present the concept of an “intelligent” joystick, an architecture which provides simple and intuitive high-level directional control of a legged robot while adjusting th...
Joel E. Chestnutt, Philipp Michel, Koichi Nishiwak...