Sciweavers

3384 search results - page 141 / 677
» More Testable Properties
Sort
View
AINA
2005
IEEE
14 years 2 months ago
Efficient Secret Sharing with Access Structures in a Hierarchy
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
Chu-Hsing Lin, Wei Lee
HAPTICS
2005
IEEE
14 years 2 months ago
Fundamental Limits in the Rendering of Virtual Haptic Textures
We discuss the properties of force-feedback haptic simulation systems that fundamentally limit the re-creation of periodic gratings, and hence, of any texture. These include sampl...
Gianni Campion, Vincent Hayward
ICRA
2005
IEEE
125views Robotics» more  ICRA 2005»
14 years 2 months ago
Scan Matching in the Hough Domain
— Scan matching is used as a building block in many robotic applications, for localization and simultaneous localization and mapping (SLAM). Although many techniques have been pr...
Andrea Censi, Luca Iocchi, Giorgio Grisetti
ANTS
2004
Springer
114views Algorithms» more  ANTS 2004»
14 years 2 months ago
Montgomery Scalar Multiplication for Genus 2 Curves
Using powerful tools on genus 2 curves like the Kummer variety, we generalize the Montgomery method for scalar multiplication to the jacobian of these curves. Previously this metho...
Sylvain Duquesne
EUROPAR
2004
Springer
14 years 2 months ago
SCISM vs IA-64 Tagging: Differences/Code Density Effects
In this paper we first present two tagging mechanisms; the SCISM and IA-64; thereafter we describe the mapping of IA-64 ISA to a SCISM configuration without changing or reassigni...
Georgi Gaydadjiev, Stamatis Vassiliadis