Sciweavers

469 search results - page 73 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
CGF
2006
148views more  CGF 2006»
13 years 7 months ago
Analysis of Reproducing Real-World Appearance on Displays of Varying Dynamic Range
We conduct a series of experiments to investigate the desired properties of a tone mapping operator (TMO) and to design such an operator based on subjective data. We propose a nov...
Akiko Yoshida, Rafal Mantiuk, Karol Myszkowski, Ha...
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 8 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
CONEXT
2009
ACM
13 years 8 months ago
ARES: an anti-jamming reinforcement system for 802.11 networks
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
ROMAN
2007
IEEE
139views Robotics» more  ROMAN 2007»
14 years 1 months ago
Tele-operation of a Mobile Robot Using a Force Reflection Joystick with a Single Hall Sensor
—Though the final goal of mobile robot navigation is to be autonomous, operators’ intelligent and skillful decisions are necessary when there are many scattered obstacles. Ther...
Soonshin Han, JangMyung Lee
DAMAS
2005
Springer
14 years 27 days ago
Cognitive Agents for Sense and Respond Logistics
We present a novel cognitive agent architecture and demonstrate its effectiveness in the Sense and Respond Logistics (SRL) domain. Effective applications to support SRL must antic...
Kshanti A. Greene, David G. Cooper, Anna L. Buczak...