Sciweavers

1027 search results - page 139 / 206
» Opening Up The Enterprise
Sort
View
CHI
2010
ACM
15 years 3 months ago
Exploring affective technologies for the classroom with the subtle stone
Constructive emotional experiences are strongly related to effective learning. Yet, it is challenging for teachers, researchers and students alike to understand the emotions exper...
Madeline Balaam, Geraldine Fitzpatrick, Judith Goo...
CSR
2009
Springer
15 years 3 months ago
Characterizing the Existence of Optimal Proof Systems and Complete Sets for Promise Classes
In this paper we investigate the following two questions: Q1: Do there exist optimal proof systems for a given language L? Q2: Do there exist complete problems for a given promise ...
Olaf Beyersdorff, Zenon Sadowski
AUSAI
2008
Springer
15 years 1 months ago
Constraint-Based Multi-agent Path Planning
Planning collision-free paths for multiple robots traversing a shared space is a problem that grows combinatorially with the number of robots. The naive centralised approach soon ...
Malcolm Ryan
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
15 years 1 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
EDCC
2008
Springer
15 years 1 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger