Sciweavers

117 search results - page 20 / 24
» Security in Mobile Communications: Challenges and Opportunit...
Sort
View
SIES
2007
IEEE
14 years 1 months ago
Architecture and Implementation of an Embedded Wormhole
Abstract— Recent advances in wireless communication technology have opened the way for mobile services and applications. This paper describes ongoing work in the context of the H...
Hugo Ortiz, Antonio Casimiro, Paulo Veríssi...
JCP
2006
120views more  JCP 2006»
13 years 7 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
IROS
2008
IEEE
136views Robotics» more  IROS 2008»
14 years 2 months ago
Enabling autonomous capabilities in underwater robotics
— Underwater operations present unique challenges and opportunities for robotic applications. These can be attributed in part to limited sensing capabilities, and to locomotion b...
Junaed Sattar, Gregory Dudek, Olivia Chiu, Ioannis...
AROBOTS
1998
100views more  AROBOTS 1998»
13 years 7 months ago
Interleaving Planning and Robot Execution for Asynchronous User Requests
Rogue is an architecture built on a real robot which provides algorithms for the integration of highlevel planning, low-level robotic execution, and learning. Rogue addresses succ...
Karen Zita Haigh, Manuela M. Veloso
SECON
2008
IEEE
14 years 2 months ago
Optimal Buffer Management Policies for Delay Tolerant Networks
—Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays may al...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...