Sciweavers

3955 search results - page 665 / 791
» Comparing the Power of Robots
Sort
View
TMC
2010
151views more  TMC 2010»
13 years 7 months ago
Access Strategies for Spectrum Sharing in Fading Environment: Overlay, Underlay, and Mixed
—In this paper, we analyze the achievable capacity of the secondary service for overlay and underlay access strategies. We then propose a novel mixed access strategy in which in ...
Mohammad G. Khoshkholgh, Keivan Navaie, Halim Yani...
TSE
2010
120views more  TSE 2010»
13 years 7 months ago
Time and Probability-Based Information Flow Analysis
Abstract—In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial stud...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
VTC
2010
IEEE
140views Communications» more  VTC 2010»
13 years 7 months ago
Superposition Coding Aided Bi-Directional Relay Transmission Employing Iteratively Decoded Self-Concatenated Convolutional Codes
— In this paper, we consider coding schemes designed for two nodes communicating with each other with the aid of a relay node, which receives information from the two nodes in th...
Muhammad Fasih Uddin Butt, Rong Zhang, Soon Xin Ng...
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 7 months ago
Triangular Self-Assembly
We discuss the self-assembly system of triangular tiles instead of square tiles, in particular right triangular tiles and equilateral triangular tiles. We show that the triangular...
Lila Kari, Shinnosuke Seki, Zhi Xu
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 7 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu