Sciweavers

1019 search results - page 87 / 204
» Referent Tracking and its Applications
Sort
View
PET
2005
Springer
15 years 9 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey
IJRR
2006
76views more  IJRR 2006»
15 years 4 months ago
From Robots to Animals: Virtual Fences for Controlling Cattle
We consider the problem of monitoring and controlling the position of herd animals, and view animals as agents with natural mobility but not strictly controllable. By exploiting k...
Zack J. Butler, Peter I. Corke, Ronald A. Peterson...
JALC
2006
125views more  JALC 2006»
15 years 4 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
EUSFLAT
2009
184views Fuzzy Logic» more  EUSFLAT 2009»
15 years 2 months ago
Recurrent Neural Kalman Filter Identification and Indirect Adaptive Control of a Continuous Stirred Tank Bioprocess
The aim of this paper is to propose a new Kalman Filter Recurrent Neural Network (KFRNN) topology and a recursive Levenberg-Marquardt (L-M) algorithm of its learning capable to est...
Ieroham S. Baruch, Carlos Román Mariaca Gas...
JSAC
2008
120views more  JSAC 2008»
15 years 4 months ago
Optimal joint probing and transmission strategy for maximizing throughput in wireless systems
Abstract-- In broadcast fading channel, channel variations can be exploited through what is referred to as multiuser diversity and opportunistic scheduling for improving system per...
Prasanna Chaporkar, Alexandre Proutiére