Sciweavers

1421 search results - page 60 / 285
» The First and Second Max-SAT Evaluations
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in f...
Paolo Bernardi, Claudio Demartini, Filippo Gandino...
DSD
2007
IEEE
150views Hardware» more  DSD 2007»
14 years 2 months ago
Adaptive Distance Estimation and Localization in WSN using RSSI Measures
Abstract—Localization is one of the most challenging and important issues in wireless sensor networks (WSNs), especially if cost-effective approaches are demanded. In this paper,...
Abdalkarim Awad, Thorsten Frunzke, Falko Dressler
ICRA
2007
IEEE
129views Robotics» more  ICRA 2007»
14 years 2 months ago
Multi-Robot Area Patrol under Frequency Constraints
— This paper discusses the problem of generating patrol paths for a team of mobile robots inside a designated target area. Patrolling requires an area to be visited repeatedly by...
Yehuda Elmaliach, Noa Agmon, Gal A. Kaminka
IPPS
2007
IEEE
14 years 1 months ago
Implementing Replica Placements: Feasibility and Cost Minimization
Given two replication schemes old X and new X , the Replica Transfer Scheduling Problem (RTSP) aims at reaching new X , starting from old X , with minimal implementation cost. In ...
Thanasis Loukopoulos, Nikos Tziritas, Petros Lamps...
EMISA
2007
Springer
14 years 1 months ago
On Industrial Use of Requirements Engineering Techniques
We discuss two experiments in which requirements engineering techniques has been used and evaluated. In the first experiment a technique called Executable Use Cases is applied in t...
Lars Bækgaard, Jens Bæk Jørgens...