Sciweavers

263 search results - page 19 / 53
» Field Division Routing
Sort
View
GECCO
2003
Springer
162views Optimization» more  GECCO 2003»
14 years 1 months ago
Optimization of Spare Capacity in Survivable WDM Networks
A network with restoration capability requires spare capacity to be used in the case of failure. Optimization of spare capacity is to find the minimum amount of spare capacity for ...
H. W. Chong, Sam Kwong
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
14 years 2 months ago
Successful attack on an FPGA-based WDDL DES cryptoprocessor without place and route constraints
In this paper, we propose a preprocessing method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure family. The strength of our method i...
Laurent Sauvage, Sylvain Guilley, Jean-Luc Danger,...
IROS
2009
IEEE
149views Robotics» more  IROS 2009»
14 years 2 months ago
Field trial of networked social robots in a shopping mall
—This paper reports the challenges of developing multiple social robots that operate in a shopping mall. We developed a networked robot system that coordinates multiple social ro...
Masahiro Shiomi, Takayuki Kanda, Dylan F. Glas, Sa...
CORR
2006
Springer
76views Education» more  CORR 2006»
13 years 7 months ago
Inconsistent parameter estimation in Markov random fields: Benefits in the computation-limited setting
Consider the problem of joint parameter estimation and prediction in a Markov random field: i.e., the model parameters are estimated on the basis of an initial set of data, and th...
Martin J. Wainwright
JIPS
2010
389views more  JIPS 2010»
13 years 2 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed