Sciweavers

294 search results - page 52 / 59
» Sensor Localization under Limited Measurement Capabilities
Sort
View
95
Voted
IWPC
2009
IEEE
15 years 6 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
ICRA
2005
IEEE
135views Robotics» more  ICRA 2005»
15 years 5 months ago
RoboTrikke: A Novel Undulatory Locomotion System
— In this paper we present a mathematical model of the TRIKKE, a human-powered scooter produced by Trikke Tech Inc. The Trikke is a three-wheeled, single-rider vehicle that can b...
Sachin Chitta, Peng Cheng, Emilio Frazzoli, Vijay ...
CLUSTER
2004
IEEE
14 years 11 months ago
Performance Evaluation of Deflection Routing in Optical IP Packet-Switched Networks
In previous papers [5,6], an optical switch architecture was proposed to handle variable-length packets such as IP datagrams, based on an AWG device to route packets and equipped w...
Stefano Bregni, Achille Pattavina
ICSE
2001
IEEE-ACM
15 years 4 months ago
Workshop on Software Engineering and Mobility
Mobility is redefining the hardware and software fabric of distributed systems. Wireless communication allows network hosts to participate in a distributed computation while on t...
Gruia-Catalin Roman, Gian Pietro Picco
CHI
2011
ACM
14 years 3 months ago
Your noise is my command: sensing gestures using the body as an antenna
Touch sensing and computer vision have made humancomputer interaction possible in environments where keyboards, mice, or other handheld implements are not available or desirable. ...
Gabe Cohn, Daniel Morris, Shwetak N. Patel, Desney...