Sciweavers

789 search results - page 91 / 158
» Pushing using Compliance
Sort
View
ACMICEC
2007
ACM
127views ECommerce» more  ACMICEC 2007»
15 years 5 months ago
Symbolic model checking of institutions
Norms defined by institutions and enforced by organizations have been put forward as a mechanism to increase the efficiency and reliability of electronic transactions carried out ...
Francesco Viganò, Marco Colombetti
ACSAC
2006
IEEE
15 years 5 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
15 years 5 months ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
ICRA
1995
IEEE
151views Robotics» more  ICRA 1995»
15 years 5 months ago
Learning Impedance Control for Robotic Manipulators
—Learning control is a concept for controlling dynamic systems in an iterative manner. It arises from the recognition that robotic manipulators are usually used to perform repeti...
Chien-Chern Cheah, Danwei Wang
ICRA
1995
IEEE
107views Robotics» more  ICRA 1995»
15 years 5 months ago
Control and Evaluation of a 7-Axis Surgical Robot for Laparoscopy
This paper describes the control and ergonomic evaluation of a ceiling mounted (or support frame suspended) 7-axis surgical robot (HISAR)f o r laparoscopic camera navigation. A ke...
Janez Funda, Kreg Gruben, Ben Eldridge, Stephen H....