Sciweavers

1512 search results - page 186 / 303
» Principles of IEEE 802.11s
Sort
View
NTMS
2009
IEEE
14 years 5 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
14 years 5 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
SASO
2009
IEEE
14 years 5 months ago
Optimising Sensor Layouts for Direct Measurement of Discrete Variables
An optimal sensor layout is attained when a limited number of sensors are placed in an area such that the cost of the placement is minimised while the value of the obtained inform...
X. Rosalind Wang, George Mathews, Don Price, Mikha...
ICRA
2009
IEEE
259views Robotics» more  ICRA 2009»
14 years 4 months ago
Constructing action set from basis functions for reinforcement learning of robot control
Abstract— Continuous action sets are used in many reinforcement learning (RL) applications in robot control since the control input is continuous. However, discrete action sets a...
Akihiko Yamaguchi, Jun Takamatsu, Tsukasa Ogasawar...
ICRA
2009
IEEE
151views Robotics» more  ICRA 2009»
14 years 4 months ago
Minimalistic control of a compass gait robot in rough terrain
— Although there has been an increasing interest in dynamic bipedal locomotion for significant improvement of energy efficiency and dexterity of mobile robots in the real world...
Fumiya Iida, Russ Tedrake