Sciweavers

788 search results - page 75 / 158
» Physics of the shannon limits
Sort
View
CEC
2009
IEEE
15 years 1 months ago
Automatic system identification based on coevolution of models and tests
In evolutionary robotics, controllers are often designed in simulation, then transferred onto the real system. Nevertheless, when no accurate model is available, controller transfe...
Sylvain Koos, Jean-Baptiste Mouret, Stéphan...
92
Voted
DBSEC
2003
149views Database» more  DBSEC 2003»
14 years 11 months ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...
VIIP
2001
14 years 11 months ago
Collision Handling and Shadow Casting in Virtual-Prismaker
Abstract. Our research team is developing a computer construction game called VirtualPrismaker based on the physical game Prismakertm . We have had to deal with all typical and ess...
Víctor López-Jaquero, Antonio Fern&a...
IOR
2008
148views more  IOR 2008»
14 years 10 months ago
A Game-Theoretic Approach to Efficient Power Management in Sensor Networks
Wireless sensor networks pose numerous fundamental coordination problems. For instance, in a number of application domains including homeland security, environmental monitoring an...
Enrique Campos-Náñez, Alfredo Garcia...
ENTCS
2007
131views more  ENTCS 2007»
14 years 9 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo