Sciweavers

1058 search results - page 22 / 212
» It's Doomed; We Can Prove It
Sort
View
FSE
2004
Springer
150views Cryptology» more  FSE 2004»
14 years 3 months ago
Ciphers Secure against Related-Key Attacks
Abstract. In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the transformed key. This paper studies the secu...
Stefan Lucks
CSL
2002
Springer
13 years 9 months ago
On the Automatizability of Resolution and Related Propositional Proof Systems
A propositional proof system is automatizable if there is an algorithm that, given a tautology, produces a proof in time polynomial in the size of its smallest proof. This notion ...
Albert Atserias, Maria Luisa Bonet
CORR
2011
Springer
176views Education» more  CORR 2011»
13 years 4 months ago
Decoding by Embedding: Correct Decoding Radius and DMT Optimality
—In lattice-coded multiple-input multiple-output (MIMO) systems, optimal decoding amounts to solving the closest vector problem (CVP). Embedding is a powerful technique for the a...
Cong Ling, Shuiyin Liu, Laura Luzzi, Damien Stehl&...
SSS
2005
Springer
115views Control Systems» more  SSS 2005»
14 years 3 months ago
Code Stabilization
Dijkstra’s concept of self-stabilization assumes that faults can only affect the variables of a program. We study the notion of selfstabilization if faults can also affect (i.e...
Felix C. Freiling, Sukumar Ghosh
ICRA
2010
IEEE
118views Robotics» more  ICRA 2010»
13 years 8 months ago
Tactile object class and internal state recognition for mobile manipulation
— Tactile information is valuable in determining properties of objects that are inaccessible from visual perception. In this work, we present a tactile perception strategy that a...
Sachin Chitta, Matthew Piccoli, Jürgen Sturm