Sciweavers

5600 search results - page 938 / 1120
» Synthesizing robust systems
Sort
View
ICRA
2008
IEEE
156views Robotics» more  ICRA 2008»
15 years 11 months ago
How to learn accurate grid maps with a humanoid
Abstract— Humanoids have recently become a popular research platform in the robotics community. Such robots offer various fields for new applications. However, they have several...
Cyrill Stachniss, Maren Bennewitz, Giorgio Grisett...
INFOCOM
2008
IEEE
15 years 11 months ago
Power Awareness in Network Design and Routing
Abstract—Exponential bandwidth scaling has been a fundamental driver of the growth and popularity of the Internet. However, increases in bandwidth have been accompanied by increa...
Joseph Chabarek, Joel Sommers, Paul Barford, Crist...
ISCAS
2008
IEEE
155views Hardware» more  ISCAS 2008»
15 years 11 months ago
Advanced colluder detection techniques for OSIFT-based hiding codes
— In this work, we examine a family of anti-collusion codes using the principle of “Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)” as introduced in [...
Byung-Ho Cha, C. C. Jay Kuo
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 11 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
PIMRC
2008
IEEE
15 years 11 months ago
A key loss recovery scheme for secure broadcasts in wireless sensor networks
Abstract—Authenticity and secrecy of broadcast message content is important in wireless sensor networks deployed for battlefield control, emergency response, and natural resourc...
Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, D...