Sciweavers

949 search results - page 62 / 190
» Fast Self-Recovering Controllers
Sort
View
JOC
1998
162views more  JOC 1998»
15 years 4 months ago
A Software-Optimized Encryption Algorithm
We describe a software-e cient encryption algorithm named SEAL 3.0. Computational cost on a modern 32-bit processor is about 4 clock cycles per byte of text. The cipher is a pseudo...
Phillip Rogaway, Don Coppersmith
RAS
2002
115views more  RAS 2002»
15 years 4 months ago
Towards vision-based safe landing for an autonomous helicopter
Autonomous landing is a challenging problem for aerial robots. An autonomous landing manoeuver depends largely on two capabilities: the decision of where to land and the generatio...
Pedro J. Garcia-Pardo, Gaurav S. Sukhatme, James F...
111
Voted
SIAMSC
2010
157views more  SIAMSC 2010»
15 years 3 months ago
Adaptive Time-Stepping for Incompressible Flow Part II: Navier--Stokes Equations
We outline a new class of robust and efficient methods for solving the Navier– Stokes equations. We describe a general solution strategy that has two basic building blocks: an im...
David A. Kay, Philip M. Gresho, David F. Griffiths...
ER
2010
Springer
124views Database» more  ER 2010»
15 years 2 months ago
Integrity Assurance for RESTful XML
The REpresentational State Transfer (REST) represents an extensible, easy and elegant architecture for accessing web-based resources. REST alone and in combination with XML is fast...
Sebastian Graf, Lukas Lewandowski, Marcel Waldvoge...
ICIP
2010
IEEE
15 years 2 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu