Sciweavers

2500 search results - page 452 / 500
» Specifying Behavior in C
Sort
View
AR
2011
14 years 6 months ago
A Direct Physical Interface for Navigation and Positioning of a Robotic Nursing Assistant
People often use direct physical contact to guide a person to a desired location (e.g., leading a child by the hand) or to adjust a person’s posture for a task (e.g., a dance in...
Tiffany L. Chen, Charles C. Kemp
CCR
2011
14 years 6 months ago
The politecast communication primitive for low-power wireless
ion can improve performance without significantly breaking layered abstractions; explicit bursts are preferable to steady, constant bitrate traffic. Furthermore, the vagaries and c...
Marcus Lundén, Adam Dunkels
SIAMCOMP
2011
14 years 6 months ago
The Chow Parameters Problem
Abstract. In the 2nd Annual FOCS (1961), Chao-Kong Chow proved that every Boolean threshold function is uniquely determined by its degree-0 and degree-1 Fourier coefficients. These...
Ryan O'Donnell, Rocco A. Servedio
ICASSP
2011
IEEE
14 years 3 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 3 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...