Sciweavers

981 search results - page 136 / 197
» Advanced Encryption Standard
Sort
View
CN
2007
95views more  CN 2007»
13 years 8 months ago
A survey on emerging broadband wireless access technologies
Wireless broadband technologies provide ubiquitous broadband access to wireless users, enabling services that were available only to wireline users. In this paper, we summarize em...
Mehmet S. Kuran, Tuna Tugcu
JSA
2006
94views more  JSA 2006»
13 years 8 months ago
An abstraction model for a Grid execution framework
action Model for a Grid Execution Framework Kaizar Amin,c,a Gregor von Laszewski,,a,b Mihael Hategan,b,a Rashid Al-Ali,d Omer Rana,d and David Walkerc aArgonne National Laboratory,...
Kaizar Amin, Gregor von Laszewski, Mihael Hategan,...
TOG
2008
293views more  TOG 2008»
13 years 8 months ago
A perceptually validated model for surface depth hallucination
Capturing detailed surface geometry currently requires specialized equipment such as laser range scanners, which despite their high accuracy, leave gaps in the surfaces that must ...
Mashhuda Glencross, Gregory J. Ward, Francho Melen...
MR
2002
82views Robotics» more  MR 2002»
13 years 8 months ago
Failure modes of tantalum capacitors made by different technologies
Generally, tantalum capacitor failure modes have been discussed both for the standard manganese dioxide cathode and the new conductive polymer (CP) type. For standard tantalum in ...
Petr Vasina, T. Zednicek, Josef Sikula, Jan Pavelk...
RAS
2010
136views more  RAS 2010»
13 years 7 months ago
A realistic benchmark for visual indoor place recognition
An important competence for a mobile robot system is the ability to localize and perform context interpretation. This is required to perform basic navigation and to facilitate loc...
Andrzej Pronobis, Barbara Caputo, Patric Jensfelt,...