Detailed knowledge of actuator properties is a prerequisite for advanced manipulator design and control. This paper deals with the experimental identification and modelling of the...
Benoit Boulet, Laeeque Daneshmend, Vincent Hayward...
The use of redundant computational nodes is a widely used design tactic to improve the reliability of complex embedded systems. However, this redundancy allocation has also an effe...
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
In this paper, we describe a low power and high speed multiplier suitable for standard cell-based ASIC design methodologies. For the purpose, an optimized booth encoder, compact 2...
Ki-seon Cho, Jong-on Park, Jin-seok Hong, Goang-se...
Potentially one of the most significant opportunities for enterprise integration is the recent development and advancement of agent based systems. However, before agents can be us...
Elizabeth A. Kendall, Margaret T. Malkoun, Chong H...