Sciweavers

1769 search results - page 31 / 354
» An implementation of argument based discussion
Sort
View
CHES
2003
Springer
145views Cryptology» more  CHES 2003»
14 years 25 days ago
Cryptanalysis of DES Implemented on Computers with Cache
This paper presents the results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay...
Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Mak...
ICRA
2002
IEEE
70views Robotics» more  ICRA 2002»
14 years 16 days ago
The Operational Space Formulation Implementation to Aircraft Canopy Polishing using a Mobile Manipulator
The Operational Space Formulation creates a framework for the analysis and control of manipulator systems with respect to the behavior of their end-effectors. Its application to ...
Rodrigo S. Jamisola, Marcelo H. Ang, Denny Oetomo,...
SEC
2000
13 years 9 months ago
A Context-Sensitive Access Control Model and Prototype Implementation
: Role-based access control associates roles with privileges and users with roles. Changes to these associations are infrequent and explicit. This may not reflect business requirem...
Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. ...
IJCAI
1989
13 years 8 months ago
Experiences Implementing a Parallel ATMS on a Shared-Memory Multiprocessor
The Assumption-Based Truth Maintenance System (ATMS) is an important tool in A I . So far its wider use has been limited due to the enormous computational resources which it requi...
Edward Rothberg, Anoop Gupta
JODS
2007
119views Data Mining» more  JODS 2007»
13 years 7 months ago
Semantic Matching: Algorithms and Implementation
We view match as an operator that takes two graph-like structures (e.g., classifications, XML schemas) and produces a mapping between the nodes of these graphs that correspond sema...
Fausto Giunchiglia, Mikalai Yatskevich, Pavel Shva...