Sciweavers

784 search results - page 4 / 157
» An underlying model for defeat mechanisms
Sort
View
TROB
2002
142views more  TROB 2002»
13 years 7 months ago
A unified geometric approach to modeling and control of constrained mechanical systems
Dynamic control of constrained mechanical systems, such as robotic manipulators under end-effector constraints, parallel manipulators, and multifingered robotic hands under closure...
Guanfeng Liu, Zexiang Li
WCE
2007
13 years 8 months ago
Building Time Series Forecasting Model By Independent Component Analysis Mechanism
—Building a time series forecasting model by independent component analysis mechanism presents in the paper. Different from using the time series directly with the traditional A...
Jin-Cherng Lin, Yung-Hsin Li, Cheng-Hsiung Liu
DNIS
2005
Springer
112views Database» more  DNIS 2005»
14 years 26 days ago
Modelling Peer-to-Peer Data Networks Under Complex System Theory
: A Peer-to-peer Data Network (PDN) is an open and evolving society of peer nodes that assemble into a network to share their data for mutual benefit. PDNs are enabled by distribu...
Cyrus Shahabi, Farnoush Banaei Kashani
CN
2004
108views more  CN 2004»
13 years 7 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
CCS
2010
ACM
13 years 7 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov