Sciweavers

599 search results - page 81 / 120
» Hide-and-Seek with Directional Sensing
Sort
View
EUROCRYPT
2006
Springer
14 years 1 months ago
A Provable-Security Treatment of the Key-Wrap Problem
Abstract. We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that key-wrap's goal is security in the ...
Phillip Rogaway, Thomas Shrimpton
ICS
2000
Tsinghua U.
14 years 1 months ago
Improving parallel system performance by changing the arrangement of the network links
The Midimew network is an excellent contender for implementing the communication subsystem of a high performance computer. This network is an optimal 2D topology in the sense ther...
Valentin Puente, Cruz Izu, José A. Gregorio...
ICALP
1995
Springer
14 years 1 months ago
Weakly Useful Sequences
An infinite binary sequence x is defined to be (i) strongly useful if there is a computable time bound within which every decidable sequence is Turing reducible to x; and (ii) w...
Stephen A. Fenner, Jack H. Lutz, Elvira Mayordomo
ICCV
1995
IEEE
14 years 1 months ago
Real-Time Obstacle Avoidance Using Central Flow Divergence and Peripheral Flow
The lure of using motion vision as a fundamental element in the perception of space drives this effort to use flow features as the sole cues for robot mobility. Real-time estimat...
David Coombs, Martin Herman, Tsai-Hong Hong, Maril...
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
13 years 12 months ago
Modular construction of finite and complete prefixes of Petri net unfoldings
This paper considers distributed systems, defined as a collection of components interacting through interfaces. Components, interfaces and distributed systems are modeled as Petri...
Agnes Madalinski, Eric Fabre