Sciweavers

813 search results - page 35 / 163
» Pipeline-centric provenance model
Sort
View
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
15 years 5 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...
DFT
2007
IEEE
109views VLSI» more  DFT 2007»
15 years 5 months ago
Safety Evaluation of NanoFabrics
Chemically Assembled Electronic Nanotechnology is a promising alternative to CMOS fabrication. In particular, the nanoFabric has proven to be a viable solution for implementing di...
Michelangelo Grosso, Maurizio Rebaudengo, Matteo S...
IROS
2006
IEEE
99views Robotics» more  IROS 2006»
15 years 4 months ago
A Cartesian Compliance Controller for a Manipulator Mounted on a Flexible Structure
— In this paper the Cartesian compliance control of a manipulator mounted on a flexible base is considered. The proposed control law aims at achieving a desired stiffness and da...
Christian Ott, Alin Albu-Schäffer, Gerd Hirzi...
76
Voted
ISCAS
2005
IEEE
122views Hardware» more  ISCAS 2005»
15 years 4 months ago
Towards a rigorous formulation of the space mapping technique for engineering design
—This paper deals with the Space Mapping (SM) approach to engineering design optimization. We attempt here a theoretical justification of methods that have already proven efficie...
Slawomir Koziel, John W. Bandler, Kaj Madsen
ICRA
2002
IEEE
66views Robotics» more  ICRA 2002»
15 years 3 months ago
Trajectory Stabilization for a Planar Carangiform Robot Fish
Abstract: This paper considers the task of trajectory stabilization for a fish-like robot by means of feedback. We use oscillatory control inputs and apply correction signals at t...
Kristi A. Morgansen, Patricio A. Vela, Joel W. Bur...