Sciweavers

9325 search results - page 1605 / 1865
» The decentralized implementability problem
Sort
View
RAS
2006
123views more  RAS 2006»
15 years 4 months ago
Planning exploration strategies for simultaneous localization and mapping
In this paper, we present techniques that allow one or multiple mobile robots to efficiently explore and model their environment. While much existing research in the area of Simul...
Benjamín Tovar, Lourdes Muñoz-G&oacu...
SMA
2008
ACM
157views Solid Modeling» more  SMA 2008»
15 years 4 months ago
Interactive physically-based shape editing
We present an alternative approach to standard geometric shape editing using physically-based simulation. With our technique, the user can deform complex objects in real-time. The...
Johannes Mezger, Bernhard Thomaszewski, Simon Pabs...
TC
2008
15 years 4 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
ASE
2005
137views more  ASE 2005»
15 years 4 months ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund
JIPS
2007
223views more  JIPS 2007»
15 years 4 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
« Prev « First page 1605 / 1865 Last » Next »