Sciweavers

19798 search results - page 3807 / 3960
» Is Structural Subtyping Useful
Sort
View
HOST
2008
IEEE
15 years 10 months ago
Place-and-Route Impact on the Security of DPL Designs in FPGAs
—Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak po...
Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Dange...
ICDCS
2008
IEEE
15 years 10 months ago
DCAR: Distributed Coding-Aware Routing in Wireless Networks
—Recently, there has been a growing interest of using network coding to improve the performance of wireless networks, for example, authors of [1] proposed the practical wireless ...
Jilin Le, John C. S. Lui, Dah-Ming Chiu
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
15 years 10 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...
ICRA
2008
IEEE
471views Robotics» more  ICRA 2008»
15 years 10 months ago
Autonomous image-based exploration for mobile robot navigation
— Image-based navigation paradigms have recently emerged as an interesting alternative to conventional modelbased methods in mobile robotics. In this paper, we augment the existi...
D. Santosh, Supreeth Achar, C. V. Jawahar
ICRA
2008
IEEE
163views Robotics» more  ICRA 2008»
15 years 10 months ago
Human-guided surgical robot system for spinal fusion surgery: CoRASS
— There are two main limitations in the conventional robot-assisted spinal fusion surgery. Since the end effector in the state of art has a role of guiding the insertion pose of ...
Jongwon Lee, Keehoon Kim, Wan Kyun Chung, Seungmoo...
« Prev « First page 3807 / 3960 Last » Next »