Sciweavers

813 search results - page 71 / 163
» Pipeline-centric provenance model
Sort
View
AUTOMATICA
2006
178views more  AUTOMATICA 2006»
13 years 9 months ago
Decentralized adaptive coordinated control of multiple robot arms without using a force sensor
This paper presents a distributed adaptive coordinated control method for multiple robot arms grasping a common object. The cases of rigid contact and rolling contact are analyzed...
Haruhisa Kawasaki, Satoshi Ueki, Satoshi Ito
ENTCS
2006
154views more  ENTCS 2006»
13 years 9 months ago
Quantitative Static Analysis Over Semirings: Analysing Cache Behaviour for Java Card
We present a semantics-based technique for modeling and analysing resource usage behaviour of programs written in a simple object oriented language like Java e code. The approach ...
Pascal Sotin, David Cachera, Thomas P. Jensen
IJNSEC
2008
104views more  IJNSEC 2008»
13 years 9 months ago
Solutions to Key Exposure Problem in Ring Signature
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we propose the first forward secure ring signature scheme and the first key-insul...
Joseph K. Liu, Duncan S. Wong
IJNSEC
2008
108views more  IJNSEC 2008»
13 years 9 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
IJSNET
2008
125views more  IJSNET 2008»
13 years 9 months ago
Minimum-cost sensor arrangement for achieving wanted coverage lifetime
: Suppose we need to watch a set of targets continuously for a required period of time, and suppose we choose any number of sensors from a fixed set of sensor types and place them ...
Jie Wang, Ning Zhong