Sciweavers

797 search results - page 114 / 160
» Timed Control with Partial Observability
Sort
View
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
13 years 11 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
AUTOMATICA
2007
116views more  AUTOMATICA 2007»
13 years 10 months ago
Periodic input estimation for linear periodic systems: Automotive engine applications
In this paper, we consider periodic linear systems driven by T0-periodic signals that we desire to reconstruct. The systems under consideration are of the form ˙x =A(t)x +A0(t)w(...
Jonathan Chauvin, Gilles Corde, Nicolas Petit, Pie...
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 4 months ago
Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet
The Internet is widely valued for distributing control over information to a lateral network of individuals, but it is not clear how these networks can most effectively organize t...
Cristen Torrey, Moira Burke, Matthew L. Lee, Anind...
ICRA
2010
IEEE
88views Robotics» more  ICRA 2010»
13 years 8 months ago
Relaxed optimization for mode estimation in skid steering
— Skid-steered vehicles, by design, must skid in order to maneuver. The skidding causes the vehicle to behave discontinuously as well as introduces complications to the observati...
Timothy M. Caldwell, Todd D. Murphey
ATS
2009
IEEE
92views Hardware» more  ATS 2009»
13 years 7 months ago
M-IVC: Using Multiple Input Vectors to Minimize Aging-Induced Delay
Negative bias temperature instability (NBTI) has been a significant reliability concern in current digital circuit design due to its effect of increasing the path delay with time a...
Song Jin, Yinhe Han, Lei Zhang 0008, Huawei Li, Xi...