Sciweavers

5164 search results - page 127 / 1033
» Consistency of the EKF-SLAM Algorithm
Sort
View
109
Voted
ARITH
2003
IEEE
15 years 6 months ago
High-Radix Iterative Algorithm for Powering Computation
A high-radix composite algorithm for the computation of the powering function (¤¦¥ ) is presented in this paper. The algorithm consists of a sequence of overlapped operations: ...
José-Alejandro Piñeiro, Milos D. Erc...
94
Voted
CHES
2003
Springer
88views Cryptology» more  CHES 2003»
15 years 5 months ago
A New Algorithm for Switching from Arithmetic to Boolean Masking
To protect a cryptographic algorithm against Differential Power Analysis, a general method consists in masking all intermediate data with a random value. When a cryptographic algo...
Jean-Sébastien Coron, Alexei Tchulkine
132
Voted
FSE
2003
Springer
228views Cryptology» more  FSE 2003»
15 years 5 months ago
Further Observations on the Structure of the AES Algorithm
We present our further observations on the structure of the AES algorithm relating to the cyclic properties of the functions used in this cipher. We note that the maximal period of...
Beomsik Song, Jennifer Seberry
ISER
1999
Springer
147views Robotics» more  ISER 1999»
15 years 5 months ago
Experimental Validation of Physics-Based Planning and Control Algorithms for Planetary Robotic Rovers
: Robotic planetary exploration is a major component of the United States’ NASA space science program. The focus of our research is to develop rover planning and control algorith...
Karl Iagnemma, Robert Burn, Eric Wilhelm, Steven D...
ESCIENCE
2006
IEEE
15 years 4 months ago
A Differential Evolution Based Algorithm to Optimize the Radio Network Design Problem
In this paper we present a Differential Evolution based algorithm used to solve the Radio Network Design (RND) problem. This problem consists in determining the optimal locations ...
Silvio Priem-Mendes, Juan Antonio Gómez Pul...