Sciweavers

1119 search results - page 72 / 224
» Computing in the Presence of Timing Failures
Sort
View
IJNSEC
2008
126views more  IJNSEC 2008»
13 years 9 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli
HRI
2009
ACM
14 years 3 months ago
How to approach humans?: strategies for social robots to initiate interaction
This paper proposes a model of approach behavior with which a robot can initiate conversation with people who are walking. We developed the model by learning from the failures in ...
Satoru Satake, Takayuki Kanda, Dylan F. Glas, Mich...
WCNC
2008
IEEE
14 years 3 months ago
Link-Diversity Routing: A Robust Routing Paradigm for Mobile Ad Hoc Networks
—We present link-diversity routing, a routing paradigm that achieves high path resilience in mobile ad hoc networks. Link-diversity routing chooses each hop of a packet’s route...
Vincent Lenders, Rainer Baumann
DSD
2011
IEEE
194views Hardware» more  DSD 2011»
12 years 9 months ago
Reliability-Aware Design Optimization for Multiprocessor Embedded Systems
—This paper presents an approach for the reliability-aware design optimization of real-time systems on multi-processor platforms. The optimization is based on an extension of wel...
Jia Huang, Jan Olaf Blech, Andreas Raabe, Christia...
PRDC
2008
IEEE
14 years 3 months ago
VTV - A Voting Strategy for Real-Time Systems
Real-time applications typically have to satisfy high dependability requirements and require fault tolerance in both value and time domains. A widely used approach to ensure fault...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...