Sciweavers

12084 search results - page 2290 / 2417
» Effect Systems with Subtyping
Sort
View
ICRA
2008
IEEE
182views Robotics» more  ICRA 2008»
15 years 10 months ago
A body joint improves vertical to horizontal transitions of a wall-climbing robot
— Several recently-designed robots are able to scale steep surfaces using animal-inspired strategies for foot attachment and leg kinematics. These designs could be valuable for r...
Kathryn A. Daltorio, Timothy C. Witushynsky, Grego...
117
Voted
ICRA
2008
IEEE
132views Robotics» more  ICRA 2008»
15 years 10 months ago
The OmniTread OT-4 serpentine robot
Serpentine robots are slender, multi-segmented vehicles designed to provide greater mobility than conventional mobile robots. Serpentine robots are ideally suited for urban search...
Johann Borenstein, Adam Borrell
175
Voted
IEEEIAS
2008
IEEE
15 years 10 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
INFOCOM
2008
IEEE
15 years 10 months ago
Firewall Compressor: An Algorithm for Minimizing Firewall Policies
—A firewall is a security guard placed between a private network and the outside Internet that monitors all incoming and outgoing packets. The function of a firewall is to exam...
Alex X. Liu, Eric Torng, Chad R. Meiners
INFOCOM
2008
IEEE
15 years 10 months ago
Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking
—Hash tables are extensively used in networking to implement data-structures that associate a set of keys to a set of values, as they provide O(1), query, insert and delete opera...
Sailesh Kumar, Jonathan S. Turner, Patrick Crowley
« Prev « First page 2290 / 2417 Last » Next »