Sciweavers

813 search results - page 35 / 163
» Pipeline-centric provenance model
Sort
View
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
14 years 2 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...
DFT
2007
IEEE
109views VLSI» more  DFT 2007»
14 years 2 months ago
Safety Evaluation of NanoFabrics
Chemically Assembled Electronic Nanotechnology is a promising alternative to CMOS fabrication. In particular, the nanoFabric has proven to be a viable solution for implementing di...
Michelangelo Grosso, Maurizio Rebaudengo, Matteo S...
IROS
2006
IEEE
99views Robotics» more  IROS 2006»
14 years 1 months ago
A Cartesian Compliance Controller for a Manipulator Mounted on a Flexible Structure
— In this paper the Cartesian compliance control of a manipulator mounted on a flexible base is considered. The proposed control law aims at achieving a desired stiffness and da...
Christian Ott, Alin Albu-Schäffer, Gerd Hirzi...
ISCAS
2005
IEEE
122views Hardware» more  ISCAS 2005»
14 years 1 months ago
Towards a rigorous formulation of the space mapping technique for engineering design
—This paper deals with the Space Mapping (SM) approach to engineering design optimization. We attempt here a theoretical justification of methods that have already proven efficie...
Slawomir Koziel, John W. Bandler, Kaj Madsen
ICRA
2002
IEEE
66views Robotics» more  ICRA 2002»
14 years 19 days ago
Trajectory Stabilization for a Planar Carangiform Robot Fish
Abstract: This paper considers the task of trajectory stabilization for a fish-like robot by means of feedback. We use oscillatory control inputs and apply correction signals at t...
Kristi A. Morgansen, Patricio A. Vela, Joel W. Bur...