Sciweavers

4636 search results - page 640 / 928
» Modelling and Validation with VipTool
Sort
View
CATA
2010
15 years 4 months ago
A Hardware Implementation of the Advanced Encryption Standard (AES) Algorithm using SystemVerilog
In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consum...
Bahram Hakhamaneshi, Behnam S. Arad
HAPTICS
2010
IEEE
15 years 4 months ago
Online Intention Recognition in Computer-Assisted Teleoperation Systems
Limitations of state-of-the-art teleoperation systems can be compensated by using shared-control teleoperation architectures that provide haptic assistance to the human operator. T...
Nikolay Stefanov, Angelika Peer, Martin Buss
ICASSP
2010
IEEE
15 years 4 months ago
Direct importance estimation with probabilistic principal component analyzers
The importance estimation problem (estimating the ratio of two probability density functions) has recently gathered a great deal of attention for use in various applications, e.g....
Makoto Yamada, Masashi Sugiyama, Gordon Wichern
FDL
2008
IEEE
15 years 4 months ago
MARTE-based Design of a Multimedia Application and Formal Analysis
Digital television (DTV) is an advanced broadcasting technology that is spreading fast today. It gives broadcasters the capability to send programs with a better picture and sound ...
Adolf Abdallah, Abdoulaye Gamatié, Jean-Luc...
CORR
2010
Springer
89views Education» more  CORR 2010»
15 years 4 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi