Sciweavers

98 search results - page 4 / 20
» NEXI, Now and Next
Sort
View
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 7 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
JDCTA
2010
125views more  JDCTA 2010»
13 years 2 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
ICRA
2010
IEEE
116views Robotics» more  ICRA 2010»
13 years 6 months ago
Soft-tissue injury in robotics
— Up to now, mostly blunt human-robot impacts were investigated in the robotics literature. In this context, the influence of robot mass and velocity during rigid impacts with a...
Sami Haddadin, Alin Albu-Schäffer, Gerd Hirzi...
ISSRE
2010
IEEE
13 years 6 months ago
Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian
Abstract—As smart phones grow in popularity, manufacturers are in a race to pack an increasingly rich set of features into these tiny devices. This brings additional complexity i...
Amiya Kumar Maji, Kangli Hao, Salmin Sultana, Saur...
ISCA
2009
IEEE
161views Hardware» more  ISCA 2009»
14 years 2 months ago
AnySP: anytime anywhere anyway signal processing
In the past decade, the proliferation of mobile devices has increased at a spectacular rate. There are now more than 3.3 billion active cell phones in the world—a device that we...
Mark Woh, Sangwon Seo, Scott A. Mahlke, Trevor N. ...