Sciweavers

14824 search results - page 2530 / 2965
» Security - Introduction
Sort
View
IROS
2007
IEEE
138views Robotics» more  IROS 2007»
15 years 10 months ago
On-demand sharing of a high-resolution panorama video from networked robotic cameras
— Due to their flexibility in coverage and resolution, networked robotic cameras become more and more popular in applications such as natural observation, security surveillance,...
Ni Qin, Dezhen Song
138
Voted
IROS
2007
IEEE
108views Robotics» more  IROS 2007»
15 years 10 months ago
Hiding the acoustic signature of a mobile robot
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Eric Martinson
ISCAS
2007
IEEE
103views Hardware» more  ISCAS 2007»
15 years 10 months ago
A Low-cost and High-performance SoC Design for OMA DRM2 Applications
A SoC design for applications of OMA DRM 2 Agent in mobile phones is presented in this paper, which has been verified by Altera Stratix EP1S80B956C6 FPGA development board. Several...
Yehua Gu, Xiaoyang Zeng, Jun Han, Jia Zhao
ISCC
2007
IEEE
15 years 10 months ago
Validating Attacks on Authentication Protocols
— It is possible to show that well-known attacks on authentication protocols are flawed. This is a problem, since good protocols may thus be dismissed rather than improved and p...
Anders Moen Hagalisletto
ISPASS
2007
IEEE
15 years 10 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
« Prev « First page 2530 / 2965 Last » Next »