Sciweavers

11172 search results - page 2168 / 2235
» Testing Physical Systems
Sort
View
113
Voted
ACSAC
2008
IEEE
15 years 10 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
116
Voted
DEXAW
2008
IEEE
120views Database» more  DEXAW 2008»
15 years 10 months ago
Self-Similarity Metric for Index Pruning in Conceptual Vector Space Models
— One of the critical issues in search engines is the size of search indexes: as the number of documents handled by an engine increases, the search must preserve its efficiency,...
Dario Bonino, Fulvio Corno
IROS
2008
IEEE
108views Robotics» more  IROS 2008»
15 years 10 months ago
A random set formulation for Bayesian SLAM
—This paper presents an alternative formulation for the Bayesian feature-based simultaneous localisation and mapping (SLAM) problem, using a random finite set approach. For a fe...
John Mullane, Ba-Ngu Vo, Martin David Adams, Wijer...
99
Voted
IROS
2008
IEEE
95views Robotics» more  IROS 2008»
15 years 10 months ago
Energy management for indoor hovering robots
— Flying has an advantage when compared to ground based locomotion, as it simplifies the task of overcoming obstacles and allows for rapid coverage of an area while also providi...
James F. Roberts, Jean-Christophe Zufferey, Dario ...
ISCA
2008
IEEE
132views Hardware» more  ISCA 2008»
15 years 9 months ago
Online Estimation of Architectural Vulnerability Factor for Soft Errors
As CMOS technology scales and more transistors are packed on to the same chip, soft error reliability has become an increasingly important design issue for processors. Prior resea...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
« Prev « First page 2168 / 2235 Last » Next »