Sciweavers

319 search results - page 49 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
SOSP
2009
ACM
15 years 6 months ago
Tolerating hardware device failures in software
Hardware devices can fail, but many drivers assume they do not. When confronted with real devices that misbehave, these assumptions can lead to driver or system failures. While ma...
Asim Kadav, Matthew J. Renzelmann, Michael M. Swif...
HYBRID
2009
Springer
15 years 4 months ago
Event-Triggering in Distributed Networked Systems with Data Dropouts and Delays
This paper studies distributed networked systems with data dropouts and transmission delays. We propose a decentralized eventtriggering scheme, where a subsystem broadcasts its sta...
Xiaofeng Wang, Michael D. Lemmon
ICRA
2009
IEEE
145views Robotics» more  ICRA 2009»
15 years 4 months ago
Expansion segmentation for visual collision detection and estimation
Abstract— Collision detection and estimation from a monocular visual sensor is an important enabling technology for safe navigation of small or micro air vehicles in near earth ï...
Jeffrey Byrne, Camillo J. Taylor
73
Voted
IROS
2008
IEEE
115views Robotics» more  IROS 2008»
15 years 4 months ago
Homing in scale space
— Local visual homing is the process of determining the direction of movement required to return an agent to a goal location by comparing the current image with an image taken at...
David Churchill, Andrew Vardy
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
15 years 3 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov