Sciweavers

777 search results - page 113 / 156
» presence 2010
Sort
View
119
Voted
ICRA
2010
IEEE
185views Robotics» more  ICRA 2010»
14 years 10 months ago
Autonomous flight at low altitude with vision-based collision avoidance and GPS-based path following
The ability to fly at low altitude while actively avoiding collisions with the terrain and other objects is a great challenge for small unmanned aircraft. This paper builds on top ...
Jean-Christophe Zufferey, Antoine Beyeler, Dario F...
106
Voted
IFIPTCS
2010
14 years 10 months ago
Safe Equivalences for Security Properties
Abstract. In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference)...
Mário S. Alvim, Miguel E. Andrés, Ca...
88
Voted
IMC
2010
ACM
14 years 10 months ago
On the feasibility of effective opportunistic spectrum access
Dynamic spectrum access networks are designed to allow today's bandwidth hungry "secondary devices" to share spectrum allocated to legacy devices, or "primary ...
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haita...
IMC
2010
ACM
14 years 10 months ago
On the impact of layer-2 on node degree distribution
The Internet topology data collected through traceroute exploration has been extensively studied in the past. In particular, a remarkable property of the Internet, the power-law s...
Pascal Mérindol, Benoit Donnet, Olivier Bon...
105
Voted
QEST
2010
IEEE
14 years 10 months ago
Information Hiding in Probabilistic Concurrent Systems
Information hiding is a general concept which refers to the goal of preventing an adversary to infer secret information from the observables. Anonymity and Information Flow are exa...
Miguel E. Andrés, Catuscia Palamidessi, Pet...