Sciweavers

125 search results - page 9 / 25
» All Secrets Great and Small
Sort
View
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
14 years 8 months ago
How Efficient Can Memory Checking Be?
We consider the problem of memory checking, where a user wants to maintain a large database on a remote server but has only limited local storage. The user wants to use the small ...
Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod V...
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
13 years 11 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
ENGL
2007
71views more  ENGL 2007»
13 years 7 months ago
The Development of a Generic Technique for Flow Line Monitoring
Realize the operating conditions of a manufacturing plant are essential for providing corresponding actions responsively. This is because all processes are interrelated and a smal...
C. S. Tang, C. Y. Chan, Kai-Leung Yung
ICRA
2008
IEEE
172views Robotics» more  ICRA 2008»
14 years 2 months ago
Robot navigation using a sparse distributed memory
— Despite all the progress that has been made in Robotics and Artificial Intelligence, traditional approaches seem unsuitable to build truly intelligent robots, exhibiting human...
Mendes Mendes, Manuel Marques Crisóstomo, A...
QEST
2008
IEEE
14 years 2 months ago
CaVi -- Simulation and Model Checking for Wireless Sensor Networks
CaVi provides a uniform interface to state-of-the-art simulation methods and formal verification methods for wireless sensor network. Simulation is suitable to examine the behavi...
Athanassios Boulis, Ansgar Fehnker, Matthias Fruth...