Sciweavers

5600 search results - page 938 / 1120
» Synthesizing robust systems
Sort
View
93
Voted
ICRA
2008
IEEE
156views Robotics» more  ICRA 2008»
15 years 7 months ago
How to learn accurate grid maps with a humanoid
Abstract— Humanoids have recently become a popular research platform in the robotics community. Such robots offer various fields for new applications. However, they have several...
Cyrill Stachniss, Maren Bennewitz, Giorgio Grisett...
78
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Power Awareness in Network Design and Routing
Abstract—Exponential bandwidth scaling has been a fundamental driver of the growth and popularity of the Internet. However, increases in bandwidth have been accompanied by increa...
Joseph Chabarek, Joel Sommers, Paul Barford, Crist...
103
Voted
ISCAS
2008
IEEE
155views Hardware» more  ISCAS 2008»
15 years 7 months ago
Advanced colluder detection techniques for OSIFT-based hiding codes
— In this work, we examine a family of anti-collusion codes using the principle of “Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)” as introduced in [...
Byung-Ho Cha, C. C. Jay Kuo
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 7 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
132
Voted
PIMRC
2008
IEEE
15 years 7 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...