Sciweavers

28962 search results - page 5702 / 5793
» Computational Mechanism Design
Sort
View
EUROCRYPT
2010
Springer
14 years 1 months ago
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryposystem relies on the use of error-correcting codes. Since...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...
CDC
2009
IEEE
134views Control Systems» more  CDC 2009»
14 years 1 months ago
Event-based control using quadratic approximate value functions
Abstract— In this paper we consider several problems involving control with limited actuation and sampling rates. Event-based control has emerged as an attractive approach for ad...
Randy Cogill
AUTOMOTIVEUI
2009
ACM
14 years 1 months ago
Towards an H-Mode for highly automated vehicles: driving with side sticks
The increasing traffic volume confronts the road user with a challenging task. The high number of traffic deaths might not be reducible with passive safety alone. However systems ...
Martin Kienle, Daniel Damböck, Johann Kelsch,...
CHI
2009
ACM
14 years 1 months ago
Adaptive information search: age-dependent interactions between cognitive profiles and strategies
Previous research has shown that older adults performed worse in web search tasks, and attributed poorer performance to a decline in their cognitive abilities. We conducted a stud...
Jessie Chin, Wai-Tat Fu, Thomas George Kannampalli...
PPPJ
2009
ACM
14 years 1 months ago
SlimVM: a small footprint Java virtual machine for connected embedded systems
The usage of cellular phones, PDAs, and other mobile devices has increased dramatically over the past ten years. Java is targeted to be one of the most popular execution environme...
Christoph Kerschbaumer, Gregor Wagner, Christian W...
« Prev « First page 5702 / 5793 Last » Next »