Sciweavers

7839 search results - page 1420 / 1568
» What's there and what's not
Sort
View
BIRTHDAY
2006
Springer
15 years 5 months ago
Coordination of Actions in an Autonomous Robotic System
Robots are autonomous agents whose actions are performed in the real world during a period of time. There are a number of general constraints on such actions, for example that the ...
Erik Sandewall
CAISE
2006
Springer
15 years 5 months ago
Loosely-Coupled Process Automation in Medical Environments
Abstract. We discuss a case study for the hospital scenario where workflow model components are distributed across various computers or devices (e.g. mobile phones, PDAs, sensors, ...
Jurate Vysniauskaite
DATE
2004
IEEE
175views Hardware» more  DATE 2004»
15 years 5 months ago
Breaking Instance-Independent Symmetries in Exact Graph Coloring
Code optimization and high level synthesis can be posed as constraint satisfaction and optimization problems, such as graph coloring used in register allocation. Graph coloring is...
Arathi Ramani, Fadi A. Aloul, Igor L. Markov, Kare...
CCS
2006
ACM
15 years 5 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 5 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
« Prev « First page 1420 / 1568 Last » Next »