Sciweavers

1056 search results - page 160 / 212
» Handbook of mathematical functions
Sort
View
GLOBECOM
2008
IEEE
14 years 4 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
ICRA
2008
IEEE
143views Robotics» more  ICRA 2008»
14 years 4 months ago
How morphology affects self-assembly in a stochastic modular robot
Abstract— Self-assembly is a process through which an organized structure can spontaneously form from simple parts. Taking inspiration from biological examples of self-assembly, ...
Shuhei Miyashita, Max Kessler, Marco Lungarella
IPPS
2008
IEEE
14 years 4 months ago
Optimal spot-checking to minimize the computation time in volunteer computing
This paper proposes an optimization technique for spotchecking to minimize the computation time of volunteer computing (VC) systems with malicious participants who return erroneou...
Kan Watanabe, Masaru Fukushi, Susumu Horiguchi
SEMCO
2008
IEEE
14 years 4 months ago
Optimal Consensus Intuitive Hand Gesture Vocabulary Design
Gesture interfaces are needed for natural intuitive communication with machine devices. Hand gesture intuitiveness is the cognitive association between a command or intent, and it...
Helman I. Stern, Juan P. Wachs, Yael Edan
TRIDENTCOM
2008
IEEE
14 years 4 months ago
Single versus multi-hop wireless reprogramming in sensor networks
— Wireless reprogramming of the sensor network is useful for uploading new code or for changing the functionality of the existing code. In recent years, the research focus has sh...
Rajesh Krishna Panta, Saurabh Bagchi, Issa Khalil,...