Sciweavers

435 search results - page 51 / 87
» Seeing through water
Sort
View
ICNP
2007
IEEE
14 years 3 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
IROS
2007
IEEE
150views Robotics» more  IROS 2007»
14 years 3 months ago
Monopedal running control: SLIP embedding and virtual constraint controllers
— Two feedback controllers that induce stable running gaits on a three-degree-of-freedom asymmetric hopper, termed the Asymmetric Spring Loaded Inverted Pendulum (ASLIP), see Fig...
Ioannis Poulakakis, J. W. Grizzle
TIME
2007
IEEE
14 years 3 months ago
Multilingual Extension of Temporal Expression Recognition Using Parallel Corpora
This paper presents the automatic extension of TERSEO to other languages, a knowledge-based system for the recognition and normalization of temporal expressions, originally develo...
Marcel Puchol-Blasco, Estela Saquete, Patricio Mar...
POLICY
2007
Springer
14 years 3 months ago
Policy-Driven Negotiation for Authorization in the Grid
In many Grid services deployments, the clients and servers reside in different administrative domains. Hence, there is a requirement both to discover each other’s authorization ...
Ionut Constandache, Daniel Olmedilla, Frank Sieben...
GLOBECOM
2006
IEEE
14 years 3 months ago
Multi-Stage Investment Decision under Contingent Demand for Networking Planning
Telecommunication companies, such as Internet and cellular service providers, are seeing rapid and uncertain growth of traffic routed through their networks. It has become a chall...
Miguel F. Anjos, Michael Desroches, Anwar Haque, O...