Sciweavers

661 search results - page 83 / 133
» Robustness Guarantees for Anonymity
Sort
View
93
Voted
IFIP
2004
Springer
15 years 6 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
ATS
2003
IEEE
151views Hardware» more  ATS 2003»
15 years 6 months ago
BDD Based Synthesis of Symmetric Functions with Full Path-Delay Fault Testability
A new technique for synthesizing totally symmetric Boolean functions is presented that achieves complete robust path delay fault testability. We apply BDDs for the synthesis of sy...
Junhao Shi, Görschwin Fey, Rolf Drechsler
ICRA
2003
IEEE
129views Robotics» more  ICRA 2003»
15 years 6 months ago
Closed loop navigation for multiple non -holonomic vehicles
In this paper we incorporate dipolar potential fields used for nonholonomic navigation into a novel potential function designed for multi – robot navigation. The derived naviga...
Savvas G. Loizou, Kostas J. Kyriakopoulos
120
Voted
IWANN
2001
Springer
15 years 5 months ago
Landmark Recognition for Autonomous Navigation Using Odometric Information and a Network of Perceptrons
In this paper two methods for the detection and recognition of landmarks to be used in topological modeling for autonomous mobile robots are presented. The first method is based o...
Javier de Lope Asiaín, Darío Maraval...
108
Voted
EDOC
2000
IEEE
15 years 5 months ago
Model Checking of Workflow Schemas
Practical experience indicates that the definition of realworld workflow applications is a complex and error-prone process. Existing workflow management systems provide the means,...
Christos T. Karamanolis, Dimitra Giannakopoulou, J...