Sciweavers

1554 search results - page 161 / 311
» An Overview of the Spring System
Sort
View
EUROCRYPT
2000
Springer
14 years 24 days ago
A NICE Cryptanalysis
We present a chosen-ciphertext attack against both NICE cryptosystems. These two cryptosystems are based on computations in the class group of non-maximal imaginary orders. More pr...
Éliane Jaulmes, Antoine Joux
DAC
2010
ACM
14 years 16 days ago
Post-silicon validation opportunities, challenges and recent advances
Post-silicon validation is used to detect and fix bugs in integrated circuits and systems after manufacture. Due to sheer design complexity, it is nearly impossible to detect and ...
Subhasish Mitra, Sanjit A. Seshia, Nicola Nicolici
APWEB
2008
Springer
13 years 11 months ago
Traceable P2P Record Exchange Based on Database Technologies
Information exchanges in P2P networks have become very popular in recent years. However, tracing how data circulates between peers and how data modifications are performed during t...
Fengrong Li, Yoshiharu Ishikawa
CDC
2008
IEEE
138views Control Systems» more  CDC 2008»
13 years 11 months ago
Guidance laws for planar motion control
This paper gives an overview of guidance laws that can be applied for planar motion control purposes. Considered scenarios include target tracking, where only instantaneous informa...
Morten Breivik, Thor I. Fossen
DICTA
2007
13 years 10 months ago
Pancam: In-Service Inspection of Locomotive Pantographs
Pancam is an inspection system for in-service monitoring of wear and damage to pantographs on electric locomotives. Damage and wear of pantographs can cause damage to the locomoti...
Leonard G. C. Hamey, Timothy Watkins, Simon Wong T...