Sciweavers

792 search results - page 85 / 159
» Reading What Machines
Sort
View
RAS
2007
132views more  RAS 2007»
13 years 8 months ago
Virtual sensors for human concepts - Building detection by an outdoor mobile robot
Abstract— In human-robot communication it is often important to relate robot sensor readings to concepts used by humans. We suggest to use a virtual sensor (one or several physic...
Martin Persson, Tom Duckett, Achim J. Lilienthal
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
14 years 3 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
SAC
2006
ACM
14 years 3 months ago
Revisiting 1-copy equivalence in clustered databases
Recently renewed interest in scalable database systems for shared nothing clusters has been supported by replication protocols based on group communication that are aimed at seaml...
Rui Carlos Oliveira, José Pereira, Alfr&aci...
ISCA
2003
IEEE
144views Hardware» more  ISCA 2003»
14 years 2 months ago
Half-Price Architecture
Current-generation microprocessors are designed to process instructions with one and two source operands at equal cost. Handling two source operands requires multiple ports for ea...
Ilhyun Kim, Mikko H. Lipasti
DSN
2002
IEEE
14 years 2 months ago
Small Byzantine Quorum Systems
In this paper we present two protocols for asynchronous Byzantine Quorum Systems (BQS) built on top of reliable channels—one for self-verifying data and the other for any data. ...
Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahl...