Sciweavers

878 search results - page 156 / 176
» Learning to Control in Operational Space
Sort
View
ASAP
2010
IEEE
315views Hardware» more  ASAP 2010»
14 years 9 months ago
A compact FPGA-based architecture for elliptic curve cryptography over prime fields
Abstract--This paper proposes an FPGA-based applicationspecific elliptic curve processor over a prime field. This research targets applications for which compactness is more import...
Jo Vliegen, Nele Mentens, Jan Genoe, An Braeken, S...
FECS
2009
164views Education» more  FECS 2009»
14 years 9 months ago
Development of a System for Teaching C/C++ Using Robots and Open Source Software in a CS1 Course
- This paper describes the development of a system for teaching C/C++ using LegoTM RCX Robots in a CS1 college course on introductory programming. The system has been implemented u...
Amy Delman, Lawrence Goetz, Yedidyah Langsam, Theo...
TLCA
2005
Springer
15 years 5 months ago
Privacy in Data Mining Using Formal Methods
There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...
Stan Matwin, Amy P. Felty, István T. Hern&a...
CCS
2010
ACM
14 years 9 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
VLDB
2006
ACM
138views Database» more  VLDB 2006»
15 years 12 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah