Sciweavers

2435 search results - page 331 / 487
» System Exploration of SystemC Designs
Sort
View
ACISP
2007
Springer
15 years 11 months ago
On Building Hash Functions from Multivariate Quadratic Equations
Recent advances in hash functions cryptanalysis provide a strong impetus to explore new designs. This paper describes a new hash function mq-hash that depends for its security on t...
Olivier Billet, Matthew J. B. Robshaw, Thomas Peyr...
CAISE
2007
Springer
15 years 11 months ago
Assessing Feasibility of IT-Enabled Networked Value Constellations: A Case Study in the Electricity Sector
Innovative networked value constellations, such as Cisco or Dell, are often enabled by Information Technology (IT). The same holds for the Distributed Electricity Balancing Service...
Zsófia Derzsi, Jaap Gordijn, Koen Kok, Hans...
IAT
2006
IEEE
15 years 11 months ago
Enhanced Recommendations through Propagation of Trust and Distrust
The incorporation of a trust network among the users of a recommender system (RS) proves beneficial to the quality and amount of recommendations. Involving also distrust can offe...
Patricia Victor, Chris Cornelis, Martine De Cock
APCSAC
2005
IEEE
15 years 10 months ago
A Stream Architecture Supporting Multiple Stream Execution Models
Multimedia devices demands a platform integrated various functional modules and an increasing support of multiple standards. Stream architecture is able to solve the problem. Howev...
Nan Wu, Mei Wen, Haiyan Li, Li Li, Chunyuan Zhang
ICRA
2005
IEEE
143views Robotics» more  ICRA 2005»
15 years 10 months ago
Locomoting with Less Computation but More Morphology
– Biped walking is one of the most graceful movements observed in humans. Today’s humanoid robots, despite their undeniably impressive performance, are still a long way from th...
Kojiro Matsushita, Max Lungarella, Chandana Paul, ...