Sciweavers

790 search results - page 71 / 158
» Designated Confirmer Signatures
Sort
View
RAS
2002
112views more  RAS 2002»
13 years 9 months ago
Avoiding self-occlusions and preserving visibility by path planning in the image
In this paper, we address the problem of generating trajectories of some image features in order to control efficiently a robotic system using an image-based control strategy. Firs...
Youcef Mezouar, François Chaumette
ASPDAC
2010
ACM
135views Hardware» more  ASPDAC 2010»
13 years 8 months ago
Statistical timing verification for transparently latched circuits through structural graph traversal
Level-sensitive transparent latches are widely used in high-performance sequential circuit designs. Under process variations, the timing of a transparently latched circuit will ada...
Xingliang Yuan, Jia Wang
DIMVA
2010
13 years 8 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
CISC
2009
Springer
186views Cryptology» more  CISC 2009»
13 years 8 months ago
Hardware Framework for the Rabbit Stream Cipher
Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union's eSTREAM portf...
Deian Stefan
ICNP
2009
IEEE
13 years 7 months ago
Achieving Efficiency and Fairness for Association Control in Vehicular Networks
Deploying city-wide 802.11 access points has made possible internet access in a vehicle, nevertheless it is challenging to maintain client performance at vehicular speed especially...
Lei Xie, Qun Li, Weizhen Mao, Jie Wu, Daoxu Chen