Sciweavers

2038 search results - page 122 / 408
» Loops under Strategies
Sort
View
CRYPTO
2007
Springer
143views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack due to Odlyzko, and a conservative extrapolation of...
Nick Howgrave-Graham
120
Voted
ICNP
2005
IEEE
15 years 9 months ago
Simple Robotic Routing in Ad Hoc Networks
Position-based routing protocols in ad hoc networks combine a forwarding strategy with a recovery algorithm. The former fails when there are void regions or physical obstacles tha...
Daejoong Kim, Nicholas F. Maxemchuk
DATE
2003
IEEE
92views Hardware» more  DATE 2003»
15 years 9 months ago
An Integrated Approach for Improving Cache Behavior
The widening gap between processor and memory speeds renders data locality optimization a very important issue in data-intensive embedded applications. Throughout the years hardwa...
Gokhan Memik, Mahmut T. Kandemir, Alok N. Choudhar...
SARA
2009
Springer
15 years 8 months ago
Rewriting Constraint Models with Metamodels
An important challenge in constraint programming is to rewrite constraint models into executable programs calculating the solutions. This phase of constraint processing may requir...
Raphaël Chenouard, Laurent Granvilliers, Rica...
ICRA
2000
IEEE
93views Robotics» more  ICRA 2000»
15 years 8 months ago
Grasping Curved Objects through Rolling
Grasping a curved object free in the plane may be done through rolling a pair of fingers on the object’s boundary. Each finger is equipped with a tactile sensor able to record...
Yan-Bin Jia