Sciweavers

290 search results - page 28 / 58
» Facing the Future
Sort
View
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 8 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
IROS
2006
IEEE
142views Robotics» more  IROS 2006»
14 years 1 months ago
Application of Optimization Techniques for an Optimal Fertilization by Centrifugal Spreading
— Mineral fertilizers application is an agricultural task widely performed by centrifugal spreaders. These machines give satisfying results with regularly spaced parallel tractor...
Teddy Virin, Jonas Koko, Emmanuel Piron, Philippe ...
SCESM
2006
ACM
266views Algorithms» more  SCESM 2006»
14 years 1 months ago
A comparative survey of scenario-based to state-based model synthesis approaches
Model Driven Development and Use Case Driven Development methodologies have inspired the proposal of a variety of software engineering approaches that synthesize statebased models...
Hongzhi Liang, Jürgen Dingel, Zinovy Diskin
GLVLSI
2008
IEEE
120views VLSI» more  GLVLSI 2008»
14 years 1 months ago
SAT-based equivalence checking of threshold logic designs for nanotechnologies
Novel nano-scale devices have shown promising potential to overcome physical barriers faced by complementary metaloxide semiconductor (CMOS) technology in future circuit design. H...
Yexin Zheng, Michael S. Hsiao, Chao Huang
RSP
2003
IEEE
103views Control Systems» more  RSP 2003»
14 years 20 days ago
An Instruction Throughput Model of Superscalar Processors
With advances in semiconductor technology, processors are becoming larger and more complex. Future processor designers will face an enormous design space, and must evaluate more a...
Tarek M. Taha, D. Scott Wills