Sciweavers

1016 search results - page 96 / 204
» Explore or Exploit
Sort
View
MICRO
2000
IEEE
107views Hardware» more  MICRO 2000»
13 years 9 months ago
An integrated approach to accelerate data and predicate computations in hyperblocks
To exploit increased instruction-level parallelism available in modern processors, we describe the formation and optimization of tracenets, an integrated approach to reducing the ...
Alexandre E. Eichenberger, Waleed Meleis, Suman Ma...
RAS
1998
150views more  RAS 1998»
13 years 8 months ago
Active Markov localization for mobile robots
Localization is the problem of determining the position of a mobile robot from sensor data. Most existing localization approaches are passive, i.e., they do not exploit the opport...
Dieter Fox, Wolfram Burgard, Sebastian Thrun
TMC
2002
147views more  TMC 2002»
13 years 8 months ago
Energy-Aware Wireless Networking with Directional Antennas: The Case of Session-Based Broadcasting and Multicasting
We consider ad hoc wireless networks that use directional antennas and have limited energy resources. To explore quantitatively the advantage offered by the use of directional ante...
Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Eph...
RAS
2007
127views more  RAS 2007»
13 years 8 months ago
Programmable springs: Developing actuators with programmable compliance for autonomous robots
Developing real robots that can exploit dynamic interactions with the environment requires the use of actuators whose behaviour can vary from high stiffness to complete complianc...
Bill Bigge, Inman R. Harvey
WISA
2010
Springer
13 years 7 months ago
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an imp...
Jean-François Gallais, Ilya Kizhvatov, Mich...