Sciweavers

2853 search results - page 416 / 571
» Finding related tables
Sort
View
DNA
2008
Springer
149views Bioinformatics» more  DNA 2008»
13 years 10 months ago
Connecting the Dots: Molecular Machinery for Distributed Robotics
Abstract. Nature is considered one promising area to search for inspiration in designing robotic systems. Some work in swarm robotics has tried to build systems that resemble distr...
Yuriy Brun, Dustin Reishus
ESEM
2008
ACM
13 years 10 months ago
Are good code reviewers also good at design review?
Software review is a necessity activity to build high reliability software in software development. In this paper, we experimentally analyze the difference in performance between ...
Hidetake Uwano, Akito Monden, Ken-ichi Matsumoto
ATMOS
2008
124views Optimization» more  ATMOS 2008»
13 years 9 months ago
Simultaneous Network Line Planning and Traffic Assignment
One of the basic problems in strategic planning of public and rail transport is the line planning problem to find a system of lines and its associated frequencies. The objectives o...
Karl Nachtigall, Karl Jerosch
ASAP
2010
IEEE
148views Hardware» more  ASAP 2010»
13 years 9 months ago
Function flattening for lease-based, information-leak-free systems
Recent research has proposed security-critical real-time embedded systems with provably-strong information containment through the use of hardware-enforced execution leases. Execut...
Xun Li, Mohit Tiwari, Timothy Sherwood, Frederic T...
FSE
2008
Springer
103views Cryptology» more  FSE 2008»
13 years 9 months ago
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for smal...
Subhamoy Maitra, Goutam Paul