Sciweavers

1033 search results - page 116 / 207
» Stop the numbers game
Sort
View
CSFW
1998
IEEE
15 years 6 months ago
Proving Security Protocols with Model Checkers by Data Independence Techniques
Model checkers such as FDR have been extremely e ective in checking for, and nding, attacks on cryptographic protocols { see, for example 11, 12, 14] and many of the papers in 3]....
A. W. Roscoe
ICRA
1998
IEEE
114views Robotics» more  ICRA 1998»
15 years 5 months ago
Intuitive Control of a Planar Bipedal Walking Robot
Bipedal robots are di cult to analyze mathematically. However, successful control strategies can be discovered using simple physical intuition and can be described in simple terms...
Jerry E. Pratt, Gill A. Pratt
ICRA
1994
IEEE
127views Robotics» more  ICRA 1994»
15 years 5 months ago
Cooperative Positioning with Multiple Robots
A number of positioning identification techniques have been used for mobile robots. Dead reckoning is a popular method, but is not reliable when a robot travels long distances or ...
Ryo Kurazume, Shigemi Nagata
CAV
2001
Springer
154views Hardware» more  CAV 2001»
15 years 5 months ago
Automated Verification of a Randomized Distributed Consensus Protocol Using Cadence SMV and PRISM
We consider the randomized consensus protocol of Aspnes and Herlihy for achieving agreement among N asynchronous processes that communicate via read/write shared registers. The alg...
Marta Z. Kwiatkowska, Gethin Norman, Roberto Segal...
IWMM
2000
Springer
108views Hardware» more  IWMM 2000»
15 years 5 months ago
Implementing an On-the-Fly Garbage Collector for Java
Java uses garbage collection (GC) for the automatic reclamation of computer memory no longer required by a running application. GC implementations for Java Virtual Machines (JVM) ...
Tamar Domani, Elliot K. Kolodner, Ethan Lewis, Eli...