Sciweavers

5234 search results - page 995 / 1047
» Simulation of Computer Network Attacks
Sort
View
RTCSA
2009
IEEE
15 years 9 months ago
Event-Based Location Dependent Data Services in Mobile WSNs
—Mobile sensors are widely deployed in Wireless Sensor Networks (WSNs) to satisfy emerging application requirements. Specifically, processing location dependent queries in mobile...
Liang Hong, Yafeng Wu, Sang Hyuk Son, Yansheng Lu
IWANN
2009
Springer
15 years 9 months ago
Automatic Generation of Biped Walk Behavior Using Genetic Algorithms
Controlling a biped robot with several degrees of freedom is a challenging task that takes the attention of several researchers in the fields of biology, physics, electronics, com...
Hugo Picado, Marcos Gestal, Nuno Lau, Luís ...
117
Voted
GLVLSI
2007
IEEE
187views VLSI» more  GLVLSI 2007»
15 years 8 months ago
DAG based library-free technology mapping
This paper proposes a library-free technology mapping algorithm to reduce delay in combinational circuits. The algorithm reduces the overall number of series transistors through t...
Felipe S. Marques, Leomar S. da Rosa Jr., Renato P...
ICC
2007
IEEE
160views Communications» more  ICC 2007»
15 years 8 months ago
Adaptive Game-Based Radio Spectrum Allocation in Doubly Selective Fading Channels
— For cognitive radio networks, a popular approach to dynamic spectrum allocation (DSA) is game theoretic, which improves spectrum efficiency in a distributed manner. In a doubl...
Duo Zhang, Zhi Tian
IROS
2007
IEEE
124views Robotics» more  IROS 2007»
15 years 8 months ago
Vocal imitation using physical vocal tract model
— A vocal imitation system was developed using a computational model that supports the motor theory of speech perception. A critical problem in vocal imitation is how to generate...
Hisashi Kanda, Tetsuya Ogata, Kazunori Komatani, H...