We present a chosen-ciphertext attack against both NICE cryptosystems. These two cryptosystems are based on computations in the class group of non-maximal imaginary orders. More pr...
Post-silicon validation is used to detect and fix bugs in integrated circuits and systems after manufacture. Due to sheer design complexity, it is nearly impossible to detect and ...
Subhasish Mitra, Sanjit A. Seshia, Nicola Nicolici
Information exchanges in P2P networks have become very popular in recent years. However, tracing how data circulates between peers and how data modifications are performed during t...
This paper gives an overview of guidance laws that can be applied for planar motion control purposes. Considered scenarios include target tracking, where only instantaneous informa...
Pancam is an inspection system for in-service monitoring of wear and damage to pantographs on electric locomotives. Damage and wear of pantographs can cause damage to the locomoti...
Leonard G. C. Hamey, Timothy Watkins, Simon Wong T...