Sciweavers

1458 search results - page 159 / 292
» The sequentially realizable functionals
Sort
View
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
15 years 9 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner
ICRA
2005
IEEE
119views Robotics» more  ICRA 2005»
15 years 9 months ago
Synthesis of Controllers for Stylized Planar Bipedal Walking
— We present a method for computing controllers for stable planar-biped walking gaits that follow a particular style. The desired style is specified with a kinematic target traj...
Dana Sharon, Michiel van de Panne
ISCC
2005
IEEE
120views Communications» more  ISCC 2005»
15 years 9 months ago
Modular Reference Implementation of an IP-DSLAM
We describe a modular reference implementation of an IPbased DSL access multiplexer (DSLAM). We identify deployment trends and primary tasks a future DSLAM has to offer. The imple...
Christian Sauer, Matthias Gries, Sören Sonnta...
123
Voted
CAISE
2005
Springer
15 years 9 months ago
A Generic Transcoding Tool for Making Web Applications Adaptive
Abstract. As personalization and device independence become prominent issues in Web development, tools to adapt existing Web Information Systems (WISs) are required. Still, current...
Zoltán Fiala, Geert-Jan Houben
CRYPTO
2005
Springer
116views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Since bit and string oblivious transfer and commitment, two primitives of paramount importance in secure two- and multi-party computation, cannot be realized in an unconditionally ...
Stefan Wolf, Jürg Wullschleger