Sciweavers

4098 search results - page 658 / 820
» Sound mobility models
Sort
View
INFOCOM
2011
IEEE
14 years 8 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
CRV
2011
IEEE
340views Robotics» more  CRV 2011»
14 years 4 months ago
Combining Multi-robot Exploration and Rendezvous
—We consider the problem of exploring an unknown environment with a pair of mobile robots. The goal is to make the robots meet (or rendezvous) in minimum time such that there is ...
Malika Meghjani, Gregory Dudek
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 7 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
IROS
2008
IEEE
104views Robotics» more  IROS 2008»
15 years 11 months ago
Kinematic study of the spider system in a biomimetic perspective
— The spiders’ ability of walking and climbing on different surfaces and in different conditions is taken into account in this paper in order to define and study a suitable sp...
Alessandro Gasparetto, Renato Vidoni, Tobias Seidl
ICAC
2006
IEEE
15 years 10 months ago
Using Autonomic Principles to Manage Converged Services in Next Generation Networks
Network resources will always be heterogeneous, and thus have different functionalities and programming models. This adversely affects interoperability. Seamless Mobility is one e...
John Strassner