Sciweavers

134 search results - page 12 / 27
» Practical Collisions for SHAMATA-256
Sort
View
CORR
2010
Springer
104views Education» more  CORR 2010»
14 years 11 months ago
Decentralised Learning MACs for Collision-free Access in WLANs
By combining the features of CSMA and TDMA, fully decentralised WLAN MAC schemes have recently been proposed that converge to collision-free schedules. In this paper we describe a ...
Minyu Fang, David Malone, Ken R. Duffy, Douglas J....
CPHYSICS
2004
93views more  CPHYSICS 2004»
14 years 11 months ago
Kinetic and dynamic Delaunay tetrahedralizations in three dimensions
We describe algorithms to implement fully dynamic and kinetic three-dimensional unconstrained Delaunay triangulations, where the time evolution of the triangulation is not only go...
Gernot Schaller, Michael Meyer-Hermann
SIGDIAL
2010
14 years 9 months ago
Non-humanlike Spoken Dialogue: A Design Perspective
We propose a non-humanlike spoken dialogue design, which consists of two elements: non-humanlike turn-taking and non-humanlike acknowledgment. Two experimental studies are reporte...
Kotaro Funakoshi, Mikio Nakano, Kazuki Kobayashi, ...
ICRA
2009
IEEE
125views Robotics» more  ICRA 2009»
14 years 9 months ago
Real-world robot navigation amongst deformable obstacles
Abstract-- In this paper, we consider the problem of mobile robots navigating in environments with non-rigid objects. Whereas robots can plan their paths more effectively when they...
Barbara Frank, Cyrill Stachniss, Ruediger Schmeddi...
IACR
2011
122views more  IACR 2011»
13 years 11 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar