Sciweavers

6517 search results - page 1275 / 1304
» On optimal service selection
Sort
View
EUROCRYPT
2004
Springer
15 years 5 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
GECCO
2004
Springer
110views Optimization» more  GECCO 2004»
15 years 5 months ago
Is the Predicted ESS in the Sequential Assessment Game Evolvable?
The Sequential Assessment Game model of animal contests predicts an evolutionarily stable strategy (ESS) that is a sequence of thresholds for giving up. Simulated evolution experim...
Winfried Just, Xiaolu Sun
DATE
2003
IEEE
101views Hardware» more  DATE 2003»
15 years 5 months ago
Energy Estimation for Extensible Processors
This paper presents an efficient methodology for estimating the energy consumption of application programs running on extensible processors. Extensible processors, which are incr...
Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj...
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
15 years 5 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
ICRA
2003
IEEE
184views Robotics» more  ICRA 2003»
15 years 5 months ago
Trajectory planning for smooth transition of a biped robot
- This paper presents a third-order spline interpolation based trajectory planning method which is aiming to achieve smooth biped swing leg trajectory by reducing the instant veloc...
Zhe Tang, Changjiu Zhou, Zengqi Sun
« Prev « First page 1275 / 1304 Last » Next »