Sciweavers

605 search results - page 32 / 121
» A strategy for efficiently verifying requirements
Sort
View
ICISC
2001
162views Cryptology» more  ICISC 2001»
13 years 10 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng
ICPP
2006
IEEE
14 years 3 months ago
Achieving Bounded Delay on Message Delivery in Publish/Subscribe Systems
Publish/subscribe (pub/sub) systems are very suitable for the dissemination of dynamic information over the Internet. As dynamic information is usually characterized by a short li...
Jinling Wang, Jiannong Cao, Jing Li, Jie Wu
ICRA
2010
IEEE
189views Robotics» more  ICRA 2010»
13 years 7 months ago
The Office Marathon: Robust navigation in an indoor office environment
Abstract-- This paper describes a navigation system that allowed a robot to complete 26.2 miles of autonomous navigation in a real office environment. We present the methods requir...
Eitan Marder-Eppstein, Eric Berger, Tully Foote, B...
AIPS
2007
13 years 11 months ago
Towards a Heuristic for Scheduling the James Webb Space Telescope
Scheduling the James Webb Space Telescope (JWST) requires modeling and minimizing the buildup of angular momentum of the spacecraft. Accounting for momentum management is expected...
Mark E. Giuliano, Reiko Rager, Nazma Ferdous
EUROCRYPT
2007
Springer
14 years 27 days ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...