Sciweavers

25316 search results - page 4755 / 5064
» Computational sensor networks
Sort
View
IWANN
2009
Springer
15 years 11 months ago
Automatic Generation of Biped Walk Behavior Using Genetic Algorithms
Controlling a biped robot with several degrees of freedom is a challenging task that takes the attention of several researchers in the fields of biology, physics, electronics, com...
Hugo Picado, Marcos Gestal, Nuno Lau, Luís ...
167
Voted
IWSEC
2009
Springer
15 years 11 months ago
Impossible Boomerang Attack for Block Cipher Structures
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differ...
Jiali Choy, Huihui Yap
LION
2009
Springer
145views Optimization» more  LION 2009»
15 years 11 months ago
A Variable Neighborhood Descent Search Algorithm for Delay-Constrained Least-Cost Multicast Routing
Abstract. The rapid evolution of real-time multimedia applications requires Quality of Service (QoS) based multicast routing in underlying computer networks. The constrained Steine...
Rong Qu, Ying Xu, Graham Kendall
NBIS
2009
Springer
15 years 11 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
122
Voted
NOSSDAV
2009
Springer
15 years 11 months ago
Fine-grained scalable streaming from coarse-grained videos
Scalable video is an attractive option for adapting the bandwidth consumption of streaming video to the available bandwidth. Fine-grained scalability can adapt most closely to the...
Pengpeng Ni, Alexander Eichhorn, Carsten Griwodz, ...
« Prev « First page 4755 / 5064 Last » Next »