Sciweavers

2778 search results - page 531 / 556
» Object localization with whiskers
Sort
View
ISCC
2006
IEEE
112views Communications» more  ISCC 2006»
14 years 2 months ago
The Precision and Energetic Cost of Snapshot Estimates in Wireless Sensor Networks
— Even for a specific application, the design space of wireless sensor networks is enormous, and traditional disciplinary boundaries are disappearing in the search for efficien...
Paul G. Flikkema
SP
2006
IEEE
169views Security Privacy» more  SP 2006»
14 years 2 months ago
A Safety-Oriented Platform for Web Applications
The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and ecommerce servic...
Richard S. Cox, Steven D. Gribble, Henry M. Levy, ...
APLAS
2006
ACM
14 years 2 months ago
A Bytecode Logic for JML and Types
This document contains the Isabelle/HOL sources underlying our paper A bytecode logic for JML and types [2], updated to Isabelle 2008. We present a program logic for a subset of s...
Lennart Beringer, Martin Hofmann
IWCMC
2006
ACM
14 years 2 months ago
Voice capacity under quality constraints for IEEE 802.11a based WLANs
The communication of voice over wireless local area networks (WLANs) is influenced by the choice of speech codec, packetization interval and PHY layer bit rates. These choices a...
Niranjan Shetty, Sayantan Choudhury, Jerry D. Gibs...
MOBIDE
2006
ACM
14 years 2 months ago
Towards correcting input data errors probabilistically using integrity constraints
Mobile and pervasive applications frequently rely on devices such as RFID antennas or sensors (light, temperature, motion) to provide them information about the physical world. Th...
Nodira Khoussainova, Magdalena Balazinska, Dan Suc...