Sciweavers

872 search results - page 81 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
ICRA
2002
IEEE
138views Robotics» more  ICRA 2002»
14 years 20 days ago
A Mobile Manipulator for Installation and Removal of Aircraft Warning Spheres on Aerial Power Transmission Lines
A semi-autonomous robot for autonomous installation and removal of aircraft warning spheres on overhead wires of electric power transmission lines is described here. Hybrid system...
Mario Fernando Montenegro Campos, Guilherme A. S. ...
ACNS
2010
Springer
189views Cryptology» more  ACNS 2010»
14 years 16 days ago
High Performance GHASH Function for Long Messages
Abstract. This work presents a new method to compute the GHASH function involved in the Galois/Counter Mode of operation for block ciphers. If X = X1 . . . Xn is a bit string made ...
Nicolas Meloni, Christophe Nègre, M. Anwar ...
ICECCS
1999
IEEE
140views Hardware» more  ICECCS 1999»
14 years 18 hour ago
Practical Considerations in Protocol Verification: The E-2C Case Study
We report on our efforts to formally specify and verify a new protocol of the E-2C Hawkeye Early Warning Aircraft. The protocol, which is currently in test at Northrop Grumman, su...
Yifei Dong, Scott A. Smolka, Eugene W. Stark, Step...
SOSP
2005
ACM
14 years 4 months ago
IRON file systems
Commodity file systems trust disks to either work or fail completely, yet modern disks exhibit more complex failure modes. We suggest a new fail-partial failure model for disks, ...
Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, N...
HYBRID
2010
Springer
14 years 2 months ago
Automatic invariant generation for hybrid systems using ideal fixed points
We present computational techniques for automatically generating algebraic (polynomial equality) invariants for algebraic hybrid systems. Such systems involve ordinary differentia...
Sriram Sankaranarayanan