Sciweavers

661 search results - page 33 / 133
» Robustness Guarantees for Anonymity
Sort
View
CARDIS
2008
Springer
146views Hardware» more  CARDIS 2008»
14 years 11 months ago
Provably Secure Grouping-Proofs for RFID Tags
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are "simultaneously" scanned by a reader device. Our goal is...
Mike Burmester, Breno de Medeiros, Rossana Motta
119
Voted
FORTE
2009
14 years 7 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...
69
Voted

Publication
234views
15 years 7 months ago
Robust Topological Operations for Dynamic Explicit Surfaces
We present a solution to the mesh tangling problem in surface tracking. Using an explicit triangle mesh to track the location of a surface as it moves in three dimensions has many ...
Tyson Brochu, Robert Bridson
CDC
2008
IEEE
106views Control Systems» more  CDC 2008»
15 years 4 months ago
Less conservative robust control of constrained linear systems with bounded disturbances
— This paper develops a novel robust control method for linear systems subject to additive and bounded disturbances. The approach is based on constraint tightening method. The pr...
Reza Ghaemi, Jing Sun, Ilya V. Kolmanovsky
CDC
2008
IEEE
15 years 3 months ago
Robust invariant set theory applied to networked buffer-level control
— A manufacturer producing several items keeps them into safety stocks (buffers) in order to supply an external stochastic demand without interruptions. We consider the classical...
Francesco Borrelli, Carmen Del Vecchio, Alessandra...