Sciweavers

ICONS
2008
IEEE
13 years 11 months ago
Using User Preferences to Enhance Privacy in Pervasive Systems
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...
ICONS
2008
IEEE
13 years 11 months ago
A Systems Engineering Approach to Exception Handling
Missing or faulty exception handling has caused a number of spectacular system failures and is a major cause of software failures in extensively tested critical systems. Prior wor...
Herbert Hecht
ICONS
2008
IEEE
13 years 11 months ago
An Efficient Hardware Implementation of the Tate Pairing in Characteristic Three
DL systems with bilinear structure recently became an important base for cryptographic protocols such as identity-based encryption (IBE). Since the main computational task is the ...
Giray Kömürcü, Erkay Savas
ICONS
2008
IEEE
13 years 11 months ago
SOPC Co-design Platform for UWB System in Wireless Sensor Network Context
– This paper presents our approach of the radio interface problematic for Wireless Sensor Network. We introduce the WSN context and constraints associated. We propose an IR-UWB s...
Daniela Dragomirescu, Aubin Lecointre, Robert Plan...
ICONS
2008
IEEE
13 years 11 months ago
Analysis of Hybrid Systems Using HySAT
In this paper we describe the complete workflow of analyzing the dynamic behavior of safety-critical embedded systems with HySAT. HySAT is an arithmetic constraint solver with a ...
Christian Herde, Andreas Eggers, Martin Fränz...
ICONS
2008
IEEE
13 years 11 months ago
Dynamic Modeling and Control of Nonholonomic Mobile Robot with Lateral Slip
— Nonholonomic mobile robots are characterized by no-slip constraints. However, in many practical situations, slips are inevitable. In this work, we develop a theoretical and sys...
Naim Sidek, Nilanjan Sarkar