Sciweavers

2500 search results - page 232 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
CACM
2000
143views more  CACM 2000»
15 years 4 months ago
Embedding Robots into the Internet
With the explosive growth of embedded computing hardware, it is possible to conceive many new networked robotic applications for diverse domains ranging from urban search and resc...
Gaurav S. Sukhatme, Maja J. Mataric
115
Voted
FGCS
2000
131views more  FGCS 2000»
15 years 4 months ago
Keystroke dynamics as a biometric for authentication
More than ever before the Internet is changing computing as we know it. Global access to information and resources is becoming an integral part of nearly every aspect of our lives...
Fabian Monrose, Aviel D. Rubin
SAFECOMP
2010
Springer
15 years 3 months ago
Security Analysis of Open Building Automation Systems
Abstract. With the integration of security-critical services into Building Automation Systems (BAS), the demands on the underlying network technologies increase rapidly. Relying on...
Wolfgang Granzer, Wolfgang Kastner
SUTC
2010
IEEE
15 years 3 months ago
Hardware Implementation of Symbol Synchronization for Underwater FSK
—— Symbol synchronization is a critical component in the design of an underwater acoustic modem. Without accurate symbol synchronization, higher bit error rates incur thus reduc...
Ying Li, Xing Zhang, Bridget Benson, Ryan Kastner
ICUIMC
2011
ACM
14 years 8 months ago
Opportunities of MIM capture in IEEE 802.11 WLANs: analytic study
Physical layer capture in WLANs makes a receiver to decode a relatively strong packet in a collision. According to recent works, an augmented physical layer capture handles interf...
Joonsoo Lee, Young-myoung Kang, Suchul Lee, Chong-...