Sciweavers

17409 search results - page 3298 / 3482
» The Design and Performance of MedJava
Sort
View
JCP
2008
206views more  JCP 2008»
15 years 4 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
JCST
2008
144views more  JCST 2008»
15 years 4 months ago
Beacon-Less Geographic Routing in Real Wireless Sensor Networks
Geographic Routing (GR) algorithms, require nodes to periodically transmit HELLO messages to allow neighbors know their positions (beaconing mechanism). Beacon-less routing algorit...
Juan A. Sánchez, Rafael Marín-P&eacu...
CORR
2007
Springer
131views Education» more  CORR 2007»
15 years 4 months ago
Cognitive Medium Access: Exploration, Exploitation and Competition
—This paper considers the design of efficient strategies that allow cognitive users to choose frequency bands to sense and access among multiple bands with unknown parameters. F...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
JFR
2008
87views more  JFR 2008»
15 years 4 months ago
Robust vision-based underwater homing using self-similar landmarks
Next generation Autonomous Underwater Vehicles (AUVs) will be required to robustly identify underwater targets for tasks such as inspection, localization and docking. Given their ...
Amaury Nègre, Cédric Pradalier, Matt...
CORR
2007
Springer
73views Education» more  CORR 2007»
15 years 4 months ago
Energy Conversion Using New Thermoelectric Generator
During recent years, microelectronics helped to develop complex and varied technologies. It appears that many of these technologies can be applied successfully to realize Seebeck ...
Guillaume Savelli, Marc Plissonnier, Jacqueline Ba...
« Prev « First page 3298 / 3482 Last » Next »