Sciweavers

3954 search results - page 627 / 791
» Image-based Model Completion
Sort
View
FC
2003
Springer
171views Cryptology» more  FC 2003»
15 years 8 months ago
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
Abstract. In this paper we describe several fault attacks on the Advanced Encryption Standard (AES). First, using optical/eddy current fault induction attacks as recently publicly ...
Johannes Blömer, Jean-Pierre Seifert
GECCO
2003
Springer
15 years 8 months ago
On Role of Implicit Interaction and Explicit Communications in Emergence of Social Behavior in Continuous Predators-Prey Pursuit
We present the result of our work on use of genetic programming for evolving social behavior of agents situated in inherently cooperative environment. We use predators-prey pursuit...
Ivan Tanev, Katsunori Shimohara
ICVS
2003
Springer
15 years 8 months ago
A Framework for Visual Servoing
We consider typical manipulation tasks in terms of a service robot framework. Given a task at hand, such as ”Pick up the cup from the dinner table”, we present a number of diff...
Danica Kragic, Henrik I. Christensen
GLVLSI
2010
IEEE
209views VLSI» more  GLVLSI 2010»
15 years 8 months ago
Enhancing debugging of multiple missing control errors in reversible logic
Researchers are looking for alternatives to overcome the upcoming limits of conventional hardware technologies. Reversible logic thereby established itself as a promising directio...
Jean Christoph Jung, Stefan Frehse, Robert Wille, ...
DATE
2002
IEEE
144views Hardware» more  DATE 2002»
15 years 8 months ago
Design Automation for Deepsubmicron: Present and Future
Advancing technology drives design technology and thus design automation EDA. How to model interconnect, how to handle degradation of signal integrity and increasing power densi...
Ralph H. J. M. Otten, Raul Camposano, Patrick Groe...