Sciweavers

1763 search results - page 225 / 353
» Visualize and Open Up
Sort
View
AUSAI
2008
Springer
14 years 9 days ago
Constraint-Based Multi-agent Path Planning
Planning collision-free paths for multiple robots traversing a shared space is a problem that grows combinatorially with the number of robots. The naive centralised approach soon ...
Malcolm Ryan
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
14 years 9 days ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
EDCC
2008
Springer
14 years 2 days ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
EUROPAR
2008
Springer
14 years 2 days ago
Exploiting Hybrid Parallelism in Web Search Engines
Abstract. With the emergence of multi-core CPU (or Chip-level MultiProcessor -CMP-), it is essential to develop techniques that capitalize on CMP's advantages to speed up very...
Carolina Bonacic, Carlos García, Mauricio M...
AMR
2008
Springer
264views Multimedia» more  AMR 2008»
13 years 12 months ago
An Approach to Automatically Tracking Music Preference on Mobile Players
More and more music is being made available to the music listener today, while people have their favorite music on their mobile players. In this paper, we investigate an approach t...
Tim Pohle, Klaus Seyerlehner, Gerhard Widmer