Sciweavers

236 search results - page 44 / 48
» A Mobile Manipulator
Sort
View
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 7 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
PUC
2000
107views more  PUC 2000»
13 years 6 months ago
Implicit Human Computer Interaction Through Context
In this paper the term implicit human computer interaction is defined. It is discussed how the availability of processing power and advanced sensing technology can enable a shift ...
Albrecht Schmidt
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
13 years 5 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
TIM
2011
151views more  TIM 2011»
13 years 2 months ago
IIR Filter Models of Haptic Vibration Textures
—Haptic tactile feedback is a widely used and effective technique in virtual reality applications. When an object’s surface is explored by stroking it using fingers, finger n...
Vijaya Lakshmi Guruswamy, Jochen Lang, Won-Sook Le...
IJNSEC
2010
324views more  IJNSEC 2010»
13 years 1 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi