Sciweavers

110 search results - page 5 / 22
» Computational Considerations in Correcting User-Language
Sort
View
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
13 years 10 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes
ICRA
1993
IEEE
97views Robotics» more  ICRA 1993»
13 years 10 months ago
Task Space Velocity Blending for Real-Time Trajectory Generation
This paper presents a new velocity blending approach to the problem of task space trajectory generation. To compare this technique with others, a generalized formulation for task ...
Richard Volpe
ICAC
2005
IEEE
14 years 9 days ago
Decentralised Autonomic Computing: Analysing Self-Organising Emergent Behaviour using Advanced Numerical Methods
When designing decentralised autonomic computing systems, a fundamental engineering issue is to assess systemwide behaviour. Such decentralised systems are characterised by the la...
Tom De Wolf, Giovanni Samaey, Tom Holvoet, Dirk Ro...
ISSAC
2007
Springer
91views Mathematics» more  ISSAC 2007»
14 years 25 days ago
Generation and optimisation of code using coxeter lattice paths
Supercomputing applications usually involve the repeated parallel application of discretized differential operators. Difficulties arise with higher-order discretizations of opera...
Thomas J. Ashby, Anthony D. Kennedy, Stephen M. Wa...
DAGSTUHL
2006
13 years 8 months ago
Coxeter Lattice Paths
Supercomputing applications usually involve the repeated parallel application of discretized differential operators. Difficulties arise with higher-order discretizations their com...
Thomas J. Ashby, Anthony D. Kennedy, Stephen M. Wa...