Sciweavers

496 search results - page 94 / 100
» Implementing the TEA algorithm on sensors
Sort
View
TROB
2008
128views more  TROB 2008»
13 years 7 months ago
Convergence-Preserving Switching for Topology-Dependent Decentralized Systems
Abstract-- Stability analysis of decentralized control mechanisms for networked, coordinating systems has generally focused on specific controller implementations, such as nearest ...
Brian Shucker, Todd D. Murphey, John K. Bennett
ICDCS
2010
IEEE
13 years 11 months ago
Deployment of a Reinforcement Backbone Network with Constraints of Connection and Resources
In recent years, we have seen a surge of interest in enabling communications over meshed wireless networks. Particularly, supporting peer-to-peer communications over a multi-hop w...
Peng Wei, Shan Chu, Xin Wang, Yu Zhou
CMMR
2007
Springer
174views Music» more  CMMR 2007»
14 years 1 months ago
Between Mapping, Sonification and Composition: Responsive Audio Environments in Live Performance
This paper describes recent work on a large-scale, interactive theater performance entitled Schwelle as a platform to pose critical questions around the conception, design and imp...
Christopher L. Salter, Marije A. J. Baalman, Danie...
MM
2005
ACM
141views Multimedia» more  MM 2005»
14 years 28 days ago
SEVA: sensor-enhanced video annotation
In this paper, we study how a sensor-rich world can be exploited by digital recording devices such as cameras and camcorders to improve a user’s ability to search through a larg...
Xiaotao Liu, Mark D. Corner, Prashant J. Shenoy
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 4 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...