Sciweavers

4998 search results - page 141 / 1000
» The case for intentional networking
Sort
View
IJRR
2002
64views more  IJRR 2002»
14 years 9 months ago
Translational and Rotational Maneuvers of an Underactuated Space Robot using Prismatic Actuators
We study the simultaneous control of three dimensional translation and rotation of an underactuated multibody space robot using sliding masses that are configured as ideal prismat...
Jinglai Shen, N. Harris McClamroch
RE
2002
Springer
14 years 9 months ago
Relating Software Requirements and Architectures Using Problem Frames
Problem frames provide a means of analyzing and decomposing problems. They emphasise the world outside of the computer, helping the developer to focus on the problem domain, inste...
Jon G. Hall, Michael Jackson, Robin C. Laney, Bash...
CORR
2008
Springer
78views Education» more  CORR 2008»
14 years 9 months ago
Wireless Secrecy in Cellular Systems with Infrastructure--Aided Cooperation
In cellular systems, confidentiality of uplink transmission with respect to eavesdropping terminals can be ensured by creating intentional interference via scheduling of concurren...
Petar Popovski, Osvaldo Simeone
ISCAS
1999
IEEE
100views Hardware» more  ISCAS 1999»
15 years 2 months ago
The state space framework for blind dynamic signal extraction and recovery
The paper describes a framework in the form of an optimization of a performance index subject to the constraints of a dynamic network, represented in the state space. The performa...
Fathi M. A. Salam, Gail Erten
ETFA
2006
IEEE
15 years 4 months ago
Profinet IO-Device Emulator based on the Man-in-the-middle Attack
A Profinet IO Network of Class A uses standard Ethernet network components. If these network components can be attacked by e.g. a man-in-themiddle attack, this is also the case fo...
Michel Baud, Max Felser