Sciweavers

3591 search results - page 627 / 719
» Typing linear constraints
Sort
View
TON
2008
86views more  TON 2008»
14 years 10 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
TROB
2008
86views more  TROB 2008»
14 years 10 months ago
Visual SLAM for Flying Vehicles
The ability to learn a map of the environment is important for numerous types of robotic vehicles. In this paper, we address the problem of learning a visual map of the ground usin...
Bastian Steder, Giorgio Grisetti, Cyrill Stachniss...
TSE
2008
128views more  TSE 2008»
14 years 10 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
TSP
2008
76views more  TSP 2008»
14 years 10 months ago
Eigenvalue Beamforming Using a Multirank MVDR Beamformer and Subspace Selection
Abstract--We derive eigenvalue beamformers to resolve an unknown signal of interest whose spatial signature lies in a known subspace, but whose orientation in that subspace is othe...
Ali Pezeshki, B. D. Van Veen, Louis L. Scharf, H. ...
TWC
2008
127views more  TWC 2008»
14 years 9 months ago
Energy-Delay Analysis of MAC Protocols in Wireless Networks
In this paper the tradeoff between energy and delay for wireless networks is studied. A network using a request-to-send (RTS) and clear-to-send (CTS) type medium access control (M...
Shih Yu Chang, Wayne E. Stark, Achilleas Anastasop...