Sciweavers

117 search results - page 17 / 24
» Open Constraints in a Closed World
Sort
View
ICS
2010
Tsinghua U.
14 years 4 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
PERCOM
2008
ACM
14 years 7 months ago
Stability and Delay Analysis for Multi-Hop Single-Sink Wireless Sensor Networks
Wireless sensor networks are commonly used to monitor and control the physical world. To provide a meaningful service such as disaster and emergency surveillance, meeting real-tim...
Muhammad Farukh Munir, Arzad Alam Kherani, Fethi F...
IROS
2006
IEEE
164views Robotics» more  IROS 2006»
14 years 1 months ago
SLAM using Visual Scan-Matching with Distinguishable 3D Points
— Scan-matching based on data from a laser scanner is frequently used for mapping and localization. This paper presents an scan-matching approach based instead on visual informat...
Federico Bertolli, Patric Jensfelt, Henrik I. Chri...
NOSSDAV
2005
Springer
14 years 26 days ago
Using n-trees for scalable event ordering in peer-to-peer games
We are concerned with the fundamental problem of event ordering in multiplayer peer-to-peer games. Event ordering, even without faults, requires all-to-all message passing with at...
Chris GauthierDickey, Virginia Mary Lo, Daniel Zap...
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 20 days ago
XML Security Using XSLT
The eXtensible Markup Language (XML) is regarded generally as having promise of becoming established as the general purpose framework for enabling transfer of data amongst heterog...
R. G. Bartlett, M. W. Cook