Sciweavers

6514 search results - page 934 / 1303
» Low-Knowledge Algorithm Control
Sort
View
145
Voted
ICDCSW
2003
IEEE
15 years 9 months ago
Computation of Minimal Uniform Transmission Power in Ad Hoc Wireless Networks
Power conservation is a critical issue for ad hoc wireless networks. The main objective of the paper is to find the minimum uniform transmission power of an ad hoc wireless netwo...
Qing Dai, Jie Wu
118
Voted
ICRA
2003
IEEE
131views Robotics» more  ICRA 2003»
15 years 9 months ago
Mode shape compensator for improving robustness of manipulator mounted on flexible base
— In this paper, the concept of the ’robust arm configuration’ (RAC) is expanded using a mode shape compensator. This compensator improves the robustness of the arm configu...
Jun Ueda, Tsuneo Yoshikawa
MEMOCODE
2003
IEEE
15 years 9 months ago
Optimizations for Faster Execution of Esterel Programs
Several efficient compilation techniques have been recently proposed for the generation of sequential (C) code from Esterel programs. Consisting essentially in direct simulation ...
Dumitru Potop-Butucaru, Robert de Simone
WPES
2003
ACM
15 years 9 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
139
Voted
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
15 years 9 months ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert