Sciweavers

1627 search results - page 196 / 326
» On context in authorization policy
Sort
View
ICRA
2007
IEEE
92views Robotics» more  ICRA 2007»
14 years 4 months ago
Undergraduate Robotics Education in Technologically Underserved Communities
— This paper addresses the challenges and benefits of undergraduate robotics education in technologically underserved communities. We present two robotics courses that the author...
M. Bernardine Dias, Brett Browning, G. Ayorkor Mil...
IPPS
2007
IEEE
14 years 4 months ago
FixD : Fault Detection, Bug Reporting, and Recoverability for Distributed Applications
Model checking, logging, debugging, and checkpointing/recovery are great tools to identify bugs in small sequential programs. The direct application of these techniques to the dom...
Cristian Tapus, David A. Noblet
CDVE
2007
Springer
112views Visualization» more  CDVE 2007»
14 years 4 months ago
VICA: A Voronoi Interface for Visualizing Collaborative Annotations
Abstract. Large-scale scientific investigation often includes collaborative data exploration among geographically distributed researchers. The tools used for this exploration typi...
Yue Wang, James Shearer, Kwan-Liu Ma
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
14 years 4 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
SYNASC
2006
IEEE
86views Algorithms» more  SYNASC 2006»
14 years 4 months ago
Implementing Parameterized Type Algorithm Definitions in Mathematica
The paper focuses on means of defining parameterized type categories and algorithms built on such types in Mathematica. Symbolic algorithms based on category theory have the advan...
Alina Andreica