Sciweavers

1497 search results - page 289 / 300
» Extended static checking
Sort
View
ACSC
2008
IEEE
14 years 3 months ago
HOVER: hybrid on-demand distance vector routing for wireless mesh networks
Abstract— Hybrid Wireless Mesh Networks are a combination of mobile ad hoc networks and infrastructure wireless mesh networks, consisting of two types of nodes: Mobile Mesh Clien...
Stephan Mir, Asad Amir Pirzada, Marius Portmann
RTAS
2008
IEEE
14 years 3 months ago
Real-Time Dynamic Power Management through Device Forbidden Regions
Dynamic Power Management (DPM) techniques are crucial in minimizing the overall energy consumption in real-time embedded systems. The timing constraints of real-time applications ...
Vinay Devadas, Hakan Aydin
ICRA
2007
IEEE
211views Robotics» more  ICRA 2007»
14 years 3 months ago
Control Camera and Light Source Positions using Image Gradient Information
— In this paper, we propose an original approach to control camera position and/or lighting conditions in an environment using image gradient information. Our goal is to ensure a...
Éric Marchand
ASIACRYPT
2007
Springer
14 years 3 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
DRM
2007
Springer
14 years 3 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...