Sciweavers

717 search results - page 62 / 144
» Kill-safe synchronization abstractions
Sort
View
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 6 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
ISVC
2007
Springer
15 years 6 months ago
Unsynchronized 4D Barcodes
Abstract. We present a novel technique for optical data transfer between public displays and mobile devices based on unsynchronized 4D barcodes. We assume that no direct (electroma...
Tobias Langlotz, Oliver Bimber
IROS
2006
IEEE
100views Robotics» more  IROS 2006»
15 years 5 months ago
Towards On-Line Trajectory Computation
Abstract— This paper proposes a new way of trajectory generation for industrial manipulators. A real-time algorithm for the interpolation of synchronized and time-optimal manipul...
Torsten Kröger, Adam Tomiczek, Friedrich M. W...
ISCAS
2005
IEEE
166views Hardware» more  ISCAS 2005»
15 years 5 months ago
Extending SystemC to support mixed discrete-continuous system modeling and simulation
—Systems on chip are more and more heterogeneous and include software, analog/RF and digital hardware, and non-electronic components such as sensors or actuators. The design and ...
Alain Vachoux, Christoph Grimm, Karsten Einwich
EUROPAR
2005
Springer
15 years 5 months ago
Event-Based Measurement and Analysis of One-Sided Communication
Abstract. To analyze the correctness and the performance of a program, information about the dynamic behavior of all participating processes is needed. The dynamic behavior can be ...
Marc-André Hermanns, Bernd Mohr, Felix Wolf