Sciweavers

691 search results - page 102 / 139
» Equational Abstractions
Sort
View
IROS
2007
IEEE
116views Robotics» more  IROS 2007»
14 years 4 months ago
A two-phased object orientation controller on soft finger operations
Abstract— The greatest characteristic of soft-fingered manipulation is its softness and flexibility during manipulating operations. In previous works, this intrinsic property h...
Takahiro Inoue, Shinichi Hirai
SASO
2007
IEEE
14 years 4 months ago
A Space- and Time-Continuous Model of Self-Organizing Robot Swarms for Design Support
— Designing and implementing artificial self-organizing systems is a challenging task since they typically behave nonintuitive and no theoretical foundations exist. Predicting a...
Heiko Hamann, Heinz Wörn
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 4 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
14 years 4 months ago
How Should We Solve Search Problems Privately?
Abstract. Secure multiparty computation allows a group of distrusting parties to jointly compute a (possibly randomized) function of their inputs. However, it is often the case tha...
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinre...
ESORICS
2007
Springer
14 years 4 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...