Sciweavers

2478 search results - page 285 / 496
» Message from the Chair
Sort
View
TMC
2012
13 years 6 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
IPPS
2007
IEEE
15 years 10 months ago
Almost Peer-to-Peer Clock Synchronization
In this paper, an almost peer-to-peer (AP2P) clock synchronization protocol is proposed. AP2P is almost peer-topeer in the sense that it provides the desirable features of a purel...
Ahmed Sobeih, Michel Hack, Zhen Liu, Li Zhang
AUSAI
2008
Springer
15 years 6 months ago
Learning a Generative Model for Structural Representations
Abstract. Graph-based representations have been used with considercess in computer vision in the abstraction and recognition of object shape and scene structure. Despite this, the ...
Andrea Torsello, David L. Dowe
AI
2004
Springer
15 years 4 months ago
Brain-actuated interaction
Over the last years evidence has accumulated that shows the possibility to analyze human brain activity on-line and translate brain states into actions such as selecting a letter ...
José del R. Millán, Fréd&eacu...
CORR
2011
Springer
183views Education» more  CORR 2011»
14 years 11 months ago
Detecting Separation in Robotic and Sensor Networks
In this paper we consider the problem of monitoring detecting separation of agents from a base station in robotic and sensor networks. Such separation can be caused by mobility an...
Chenda Liao, Harshavardhan Chenji, Prabir Barooah,...