Sciweavers

1486 search results - page 206 / 298
» Algorithms for two-box covering
Sort
View
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
15 years 9 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three diļ¬...
David Naccache, Michael Tunstall
CP
2000
Springer
15 years 9 months ago
Boosting Search with Variable Elimination
Abstract. Variable elimination is the basic step of Adaptive Consistency 4 . It transforms the problem into an equivalent one, having one less variable. Unfortunately, there are ma...
Javier Larrosa
126
Voted
ICRA
1999
IEEE
117views Robotics» more  ICRA 1999»
15 years 9 months ago
Collision Control in Teleoperation by Virtual Force Reflection: An Application to the ROBTET System
: Well known collision avoiding approaches used in automatic robot path planning are also applied in teleoperation systems when moving in hazardous environments. In such cases, it ...
Miguel Hernando, Ernesto Gambao, E. Pinto, Antonio...
DAC
1997
ACM
15 years 8 months ago
System Level Fixed-Point Design Based on an Interpolative Approach
The design process for xed-point implementations either in software or in hardware requires a bit-true speci cation of the algorithm in order to analyze quantization e ects on an...
Markus Willems, Volker Bürsgens, Holger Kedin...
DDECS
2009
IEEE
149views Hardware» more  DDECS 2009»
15 years 8 months ago
Physical design oriented DRAM Neighborhood Pattern Sensitive Fault testing
Although the Neighborhood Pattern Sensitive Fault (NPSF) model is recognized as a high quality fault model for memory arrays, the excessive test application time cost associated wi...
Yiorgos Sfikas, Yiorgos Tsiatouhas