Sciweavers

2172 search results - page 200 / 435
» Distributed User Access Control in Sensor Networks
Sort
View
SENSYS
2006
ACM
15 years 8 months ago
Virtual high-resolution for sensor networks
The resolution at which a sensor network collects data is a crucial parameter of performance since it governs the range of applications that are feasible to be developed using tha...
Aman Kansal, William J. Kaiser, Gregory J. Pottie,...
SIGCOMM
2010
ACM
15 years 2 months ago
Residual white space distribution-based opportunistic channel access for cognitive radio enabled devices
We describe an opportunistic channel access scheme for cognitive radio-enabled secondary nodes (SNs). The proposed scheme uses the residual channel idle time distribution to estim...
Manuj Sharma, Anirudha Sahoo
SRDS
2003
IEEE
15 years 7 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
98
Voted
ICRA
2005
IEEE
104views Robotics» more  ICRA 2005»
15 years 8 months ago
System Design and Dynamic Walking of Humanoid Robot KHR-2
- In this paper, we describe the mechanical design, system integration and dynamic walking of the humanoid, KHR-2 (KAIST Humanoid Robot–2). KHR-2 has 41 DOFs in total, that allow...
Jung-Yup Kim, Ill-Woo Park, Jungho Lee, Min-Su Kim...
AINA
2009
IEEE
15 years 9 months ago
VirtCloud: Virtualising Network for Grid Environments
Networking infrastructure is a vital part of virtual computer clusters. This paper describes VirtCloud, a system for interconnecting virtual clusters in a state-wide network based...
David Antos, Ludek Matyska, Petr Holub, Jirí...