Sciweavers

188 search results - page 15 / 38
» Developing a Hardware Evaluation Method for SHA-3 Candidates
Sort
View
IROS
2008
IEEE
171views Robotics» more  IROS 2008»
15 years 3 months ago
Action planner of hybrid leg-wheel robots for lunar and planetary exploration
— In this paper, we propose an action planning algorithm and its evaluation method based on dynamic simulation for a novel type of hybrid leg-wheel rover for planetary exploratio...
Eric Rohmer, Giulio Reina, Genya Ishigami, Keiji N...
119
Voted
ENTCS
2008
390views more  ENTCS 2008»
14 years 8 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
COLING
2010
14 years 4 months ago
Opinion Summarization with Integer Linear Programming Formulation for Sentence Extraction and Ordering
In this paper we propose a novel algorithm for opinion summarization that takes account of content and coherence, simultaneously. We consider a summary as a sequence of sentences ...
Hitoshi Nishikawa, Takaaki Hasegawa, Yoshihiro Mat...
85
Voted
ICRA
2002
IEEE
127views Robotics» more  ICRA 2002»
15 years 2 months ago
Performance Tests of Partitioned Approaches to Visual Servo Control
Visual Servoing has been a viable method of robot manipulator control for more than a decade. Image-Based Visual Servoing (IBVS), in particular, has seen considerable development ...
Nicholas R. Gans, Peter I. Corke, Seth Hutchinson
IPPS
2010
IEEE
14 years 7 months ago
Performance modeling of heterogeneous systems
Predicting how well applications may run on modern systems is becoming increasingly challenging. It is no longer sufficient to look at number of floating point operations and commu...
Jan Christian Meyer, Anne C. Elster