Sciweavers

53302 search results - page 10574 / 10661
» Meta-Design: Design for Designers
Sort
View
IJNSEC
2007
193views more  IJNSEC 2007»
13 years 8 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
IJNSEC
2007
204views more  IJNSEC 2007»
13 years 8 months ago
Enhanced DSR for MANET with Improved Secured Route Discovery and QoS
Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless networ...
Anil Rawat, Prakash Dattatraya Vyavahare, Ashwani ...
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 8 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
IJRR
2007
117views more  IJRR 2007»
13 years 8 months ago
Wave Haptics: Building Stiff Controllers from the Natural Motor Dynamics
— Haptics, like the fields of robotics and motion control, relies on high stiffness position control of electric motors. Traditionally DC motors are driven by current amplifier...
Nicola Diolaiti, Günter Niemeyer, Neal A. Tan...
TASE
2008
IEEE
13 years 8 months ago
Stochastic Modeling of an Automated Guided Vehicle System With One Vehicle and a Closed-Loop Path
Abstract--The use of automated guided vehicles (AGVs) in material-handling processes of manufacturing facilities and warehouses isbecomingincreasinglycommon.AcriticaldrawbackofanAG...
Aykut F. Kahraman, Abhijit Gosavi, Karla J. Oty
« Prev « First page 10574 / 10661 Last » Next »