Sciweavers

6434 search results - page 984 / 1287
» Model Transformations with Reference Models
Sort
View
HRI
2007
ACM
15 years 8 months ago
On-line behaviour classification and adaptation to human-robot interaction styles
This paper presents a proof-of-concept of a robot that is adapting its behaviour on-line, during interactions with a human according to detected play styles. The study is part of ...
Dorothée François, Daniel Polani, Ke...
CHES
2006
Springer
88views Cryptology» more  CHES 2006»
15 years 8 months ago
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage
Recent research has shown that cryptographers with glitches are vulnerable in front of Side Channel Attacks (SCA). Since then, several methods, such as Wave Dynamic Differential Lo...
Zhimin Chen, Yujie Zhou
EDOC
2004
IEEE
15 years 8 months ago
Towards an MDA-Oriented UML Profile for Distribution
The era of distributed systems is upon us. Middlewarespecific concerns, and especially the distribution concern, which is the core of any middleware-mediated application, are addr...
Raul Silaghi, Frédéric Fondement, Al...
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 8 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
EKAW
2006
Springer
15 years 8 months ago
From Natural Language to Formal Proof Goal
Guidelines (Extended abstract) Ruud Stegers1 , Annette ten Teije1 , and Frank van Harmelen1 Vrije Universiteit, Amsterdam The main problem encountered when starting verification of...
Ruud Stegers, Annette ten Teije, Frank van Harmele...