Sciweavers

1845 search results - page 315 / 369
» Computing the Angularity Tolerance
Sort
View
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 11 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
FLAIRS
2006
13 years 11 months ago
Focusing Strategies for Multiple Fault Diagnosis
Diagnosing multiple faults for a complex system is often very difficult. It requires not only a model which adequately represents the diagnostic aspect of a complex system, but al...
Tsai-Ching Lu, K. Wojtek Przytula
SIROCCO
2001
13 years 11 months ago
On Finding Minimum Deadly Sets for Directed Networks
Given a set S of elements in a directed network that are initially faulty, an element becomes (functionally) faulty if all its in-neighbors or all its outneighbors are (functional...
Norbert Zeh, Nicola Santoro
WSCG
2004
146views more  WSCG 2004»
13 years 11 months ago
Frequency-based Operators for Freeform Feature Shape Reuse
Freeform feature shape reuse is an important issue in industrial design supporting. In this paper, the frequencybased operators for freeform feature shape reuse are discussed. Unl...
Chensheng Wang, Joris S. M. Vergeest, Yu Song
ATAL
2010
Springer
13 years 11 months ago
UAV swarm coordination using cooperative control for establishing a wireless communications backbone
In this paper, we present a mechanism to fly a swarm of UAVs with the aim of establishing a wireless backbone over a pre-specified area. The backbone is aimed at connecting interm...
Achudhan Sivakumar, Colin Keng-Yan Tan