Sciweavers

209 search results - page 42 / 42
» Online Experiments: Practical Lessons
Sort
View
WISEC
2010
ACM
14 years 8 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
JDCTA
2010
347views more  JDCTA 2010»
13 years 2 months ago
Application of 3D body scanning technology to human measurement for clothing Fit
Complications with garment sizing and poor fit inconvenience many consumers who become dissatisfied with such provision on the high street. It is evident that human measurement an...
Phoebe R. Apeagyei
CDC
2010
IEEE
125views Control Systems» more  CDC 2010»
12 years 11 months ago
Persistent patrol with limited-range on-board sensors
— We propose and analyze the Persistent Patrol Problem (PPP). An unmanned aerial vehicle (UAV) moving with constant speed and unbounded acceleration patrols a bounded region of t...
Vu Anh Huynh, John Enright, Emilio Frazzoli
NETGAMES
2006
ACM
14 years 1 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...