Sciweavers

509 search results - page 80 / 102
» clear 2006
Sort
View
IJNSEC
2006
134views more  IJNSEC 2006»
14 years 9 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
IJRR
2006
126views more  IJRR 2006»
14 years 9 months ago
Market-based Multirobot Coordination for Complex Tasks
Current technological developments and application-driven demands are bringing us closer to the realization of autonomous multirobot systems performing increasingly complex missio...
Robert Zlot, Anthony Stentz
JFP
2006
78views more  JFP 2006»
14 years 9 months ago
Sound and complete models of contracts
Even in statically typed languages it is useful to have certain invariants checked dynamically. Findler and Felleisen gave an algorithm for dynamically checking expressive highero...
Matthias Blume, David A. McAllester
ENGL
2007
80views more  ENGL 2007»
14 years 9 months ago
Movement Compatibility for Rotary Control and Digital Display
— Using real mechanical controls, this experiment studied strength and reversibility of direction-of-motion stereotypes and response times for different configurations of digital...
W. H. Chan, Alan H. S. Chan
KAIS
2006
126views more  KAIS 2006»
14 years 9 months ago
Fast and exact out-of-core and distributed k-means clustering
Clustering has been one of the most widely studied topics in data mining and k-means clustering has been one of the popular clustering algorithms. K-means requires several passes ...
Ruoming Jin, Anjan Goswami, Gagan Agrawal