Sciweavers

1424 search results - page 119 / 285
» Improving on Version Stamps
Sort
View
ASIACRYPT
2001
Springer
15 years 3 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
15 years 3 months ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
ICRA
2000
IEEE
96views Robotics» more  ICRA 2000»
15 years 3 months ago
Fault Detection for Robot Manipulators with Parametric Uncertainty: A Prediction Error Based Approach
—In this paper, we introduce a new approach to fault detection for robot manipulators. The technique, which is based on the isolation of fault signatures via filtered torque pred...
Warren E. Dixon, Ian D. Walker, Darren M. Dawson, ...
ECAI
2000
Springer
15 years 3 months ago
Incremental Forward Checking for the Disjunctive Temporal Problem
Abstract. This paper studies algorithms for the Disjunctive Temporal Problem (DTP) a quite general temporal reasoning problem introduced in [12]. This problem involves the satisfac...
Angelo Oddi, Amedeo Cesta
COOPIS
1999
IEEE
15 years 3 months ago
Selectively Materializing Data in Mediators by Analyzing User Queries
There is currently great interest in building information mediators that can integrate informationfrom multipledata sources such as databases or Web sources. The query response ti...
Naveen Ashish, Craig A. Knoblock, Cyrus Shahabi