Sciweavers

1834 search results - page 348 / 367
» Public Key Cryptography
Sort
View
ISRR
2001
Springer
165views Robotics» more  ISRR 2001»
14 years 3 days ago
Human-Centered Robotics and Interactive Haptic Simulation
A new field of robotics is emerging. Robots are today moving towards applications beyond the structured environment of a manufacturing plant. They are making their way into the e...
Oussama Khatib, Oliver Brock, K. C. Chang, Diego C...
VLDB
2001
ACM
109views Database» more  VLDB 2001»
14 years 2 days ago
Analyzing energy behavior of spatial access methods for memory-resident data
The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight, together with performance considerations. Energy-conscious design is...
Ning An, Anand Sivasubramaniam, Narayanan Vijaykri...
SIGCOMM
2000
ACM
14 years 13 hour ago
Delayed internet routing convergence
This paper examines the latency in Internet path failure, failover and repair due to the convergence properties of interdomain routing. Unlike switches in the public telephony net...
Craig Labovitz, Abha Ahuja, Abhijit Bose, Farnam J...
WCRE
1999
IEEE
13 years 12 months ago
Experiments with Clustering as a Software Remodularization Method
As valuable software systems get old, reverse engineering becomes more and more important to the companies that have to maintain the code. Clustering is a key activity in reverse ...
Nicolas Anquetil, Timothy Lethbridge
ICRA
1998
IEEE
144views Robotics» more  ICRA 1998»
13 years 12 months ago
The Atacama Desert Trek: Outcomes
In June and July 1997, Nomad, a planetary-relevant mobile robot, traversed more than 220 kilometers across the barren Atacama Desert in Chile, exploring a landscape analogous to t...
Deepak Bapna, Eric Rollins, John Murphy, Mark W. M...