Sciweavers

4305 search results - page 73 / 861
» Analysing Protocol Implementations
Sort
View
ISQED
2010
IEEE
120views Hardware» more  ISQED 2010»
14 years 3 months ago
Methodology from chaos in IC implementation
— Algorithms and tools used for IC implementation do not show deterministic and predictable behaviors with input parameter changes. Due to suboptimality and inaccuracy of underly...
Kwangok Jeong, Andrew B. Kahng
ICRA
2006
IEEE
97views Robotics» more  ICRA 2006»
14 years 2 months ago
Practical Kinematics for Real-time Implementation of Continuum Robots
Abstract - This paper introduces new analyses and algorithms which are essential for the practical implementation of continuous backbone continuum robots. Actuator length limits st...
Bryan A. Jones, William McMahan, Ian D. Walker
SYNTHESE
2008
69views more  SYNTHESE 2008»
13 years 8 months ago
Dispositional implementation solves the superfluous structure problem
Abstract. Consciousness supervenes on activity; computation supervenes on structure. Because of this, some argue, conscious states cannot supervene on computational ones. If true, ...
Colin Klein
SEC
2004
13 years 10 months ago
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards
: Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microproce...
Konstantinos Rantos, Constantinos Markantonakis
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
13 years 8 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo