Sciweavers

905 search results - page 28 / 181
» The Case Against Micropayments
Sort
View
DFT
2008
IEEE
82views VLSI» more  DFT 2008»
14 years 2 months ago
Selective Hardening of NanoPLA Circuits
Nanoelectronic components are expected to suffer from very high error rates, implying the need for hardening techniques. We propose a fine-grained approach to harden a promising...
Ilia Polian, Wenjing Rao
SCAM
2007
IEEE
14 years 2 months ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
14 years 2 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
KES
2007
Springer
14 years 2 months ago
A Rewrite Based Approach for Enforcing Access Constraints for XML
Abstract. Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in recent literature. Recently a case has been made for exp...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
ICRA
2002
IEEE
83views Robotics» more  ICRA 2002»
14 years 24 days ago
Kinematic Constraints for Assisted Single-Arm Manipulation
Of several possible forms of human-robot collaborative manipulation, we focus on the case where the human and the robot jointlymanipulate a common load. In our formulation, the ro...
Tanya Tickel, David Hannon, Kevin M. Lynch, Michae...