Sciweavers

2379 search results - page 435 / 476
» Aspectizing Multi-agent Systems: From Architecture to Implem...
Sort
View
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 7 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
IPSN
2007
Springer
15 years 7 months ago
Underground structure monitoring with wireless sensor networks
Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-...
Mo Li, Yunhao Liu
PDCAT
2007
Springer
15 years 7 months ago
A Distributed Virtual Machine for Parallel Graph Reduction
We present the architecture of nreduce, a distributed virtual machine which uses parallel graph reduction to run programs across a set of computers. It executes code written in a ...
Peter M. Kelly, Paul D. Coddington, Andrew L. Wend...
IROS
2006
IEEE
100views Robotics» more  IROS 2006»
15 years 7 months ago
Towards On-Line Trajectory Computation
Abstract— This paper proposes a new way of trajectory generation for industrial manipulators. A real-time algorithm for the interpolation of synchronized and time-optimal manipul...
Torsten Kröger, Adam Tomiczek, Friedrich M. W...
HT
2006
ACM
15 years 7 months ago
Just-in-time recovery of missing web pages
We present Opal, a light-weight framework for interactively locating missing web pages (http status code 404). Opal is an example of “in vivo” preservation: harnessing the col...
Terry L. Harrison, Michael L. Nelson