Sciweavers

345 search results - page 28 / 69
» Computer-Assisted Simulation Proofs
Sort
View
ICRA
2008
IEEE
105views Robotics» more  ICRA 2008»
15 years 9 months ago
A ladybug exploration strategy for distributed adaptive coverage control
— A control strategy inspired by the hunting tactics of ladybugs is presented to simultaneously achieve sensor coverage and exploration of an area with a group of networked robot...
Mac Schwager, Francesco Bullo, David Skelly, Danie...
ICNS
2006
IEEE
15 years 8 months ago
MojaveComm: A Robust Group Communication Library for Grid Environments
This paper introduces a fault-tolerant group communication protocol that is aimed at grid and wide area environments. The protocol has two layers. The lower layer provides a total...
Cristian Tapus, David A. Noblet, Jason Hickey
ANTS
2004
Springer
149views Algorithms» more  ANTS 2004»
15 years 7 months ago
A Binary Recursive Gcd Algorithm
The binary algorithm is a variant of the Euclidean algorithm that performs well in practice. We present a quasi-linear time recursive algorithm that computes the greatest common di...
Damien Stehlé, Paul Zimmermann
CSL
2004
Springer
15 years 7 months ago
Predicate Transformers and Linear Logic: Yet Another Denotational Model
In the refinement calculus, monotonic predicate transformers are used to model specifications for (imperative) programs. Together with a natural notion of simulation, they form a...
Pierre Hyvernat
EUROCRYPT
2010
Springer
15 years 5 months ago
Efficient Lattice (H)IBE in the Standard Model
We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard model. The key step in...
Shweta Agrawal, Dan Boneh, Xavier Boyen