Sciweavers

2272 search results - page 203 / 455
» Validity Invariants and Effects
Sort
View
ICRA
2009
IEEE
129views Robotics» more  ICRA 2009»
14 years 5 months ago
Novel parameter estimation schemes in microsystems
— This paper presents two novel estimation methods that are designed to enhance our ability of observing, positioning, and physically transforming the objects and/or biological s...
Hakan Bilen, Muhammet A. Hocaoglu, Eray A. Baran, ...
ICSM
2009
IEEE
14 years 5 months ago
Regression model checking
Model checking is a promising technique for verifying program behavior and is increasingly finding usage in industry. To date, however, researchers have primarily considered mode...
Guowei Yang, Matthew B. Dwyer, Gregg Rothermel
INFOCOM
2009
IEEE
14 years 5 months ago
Forward Correction and Fountain codes in Delay Tolerant Networks
Abstract—Delay tolerant Ad-hoc Networks leverage the mobility of relay nodes to compensate for lack of permanent connectivity and thus enable communication between nodes that are...
Eitan Altman, Francesco De Pellegrini
IROS
2009
IEEE
172views Robotics» more  IROS 2009»
14 years 5 months ago
Modeling mobile robot motion with polar representations
— This article compares several parameterizations and motion models for improving the estimation of the nonlinear uncertainty distribution produced by robot motion. In previous w...
Joseph Djugash, Sanjiv Singh, Ben Grocholsky
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
14 years 5 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang