The resolution at which a sensor network collects data is a crucial parameter of performance since it governs the range of applications that are feasible to be developed using tha...
Aman Kansal, William J. Kaiser, Gregory J. Pottie,...
We describe an opportunistic channel access scheme for cognitive radio-enabled secondary nodes (SNs). The proposed scheme uses the residual channel idle time distribution to estim...
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
- In this paper, we describe the mechanical design, system integration and dynamic walking of the humanoid, KHR-2 (KAIST Humanoid Robot–2). KHR-2 has 41 DOFs in total, that allow...
Jung-Yup Kim, Ill-Woo Park, Jungho Lee, Min-Su Kim...
Networking infrastructure is a vital part of virtual computer clusters. This paper describes VirtCloud, a system for interconnecting virtual clusters in a state-wide network based...
David Antos, Ludek Matyska, Petr Holub, Jirí...