Sciweavers

92 search results - page 18 / 19
» VLSI architecture based on packet data transfer scheme and i...
Sort
View
CCS
2007
ACM
13 years 11 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
EJWCN
2010
162views more  EJWCN 2010»
13 years 6 days ago
OMNeT++-Based Cross-Layer Simulator for Content Transmission over Wireless Ad Hoc Networks
Flexbility and deployment simplicity are among the numerous advantages of wireless links when compared to standard wired communications. However, challenges do remain high for wire...
Raphaël Massin, Catherine Lamy-Bergot, Christ...
DIM
2005
ACM
13 years 7 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
CGF
2008
109views more  CGF 2008»
13 years 5 months ago
Image-based Material Weathering
The appearance manifold [WTL 06] is an efficient approach for modeling and editing time-variant appearance of materials from the BRDF data captured at single time instance. Howeve...
Su Xue, Jiaping Wang, Xin Tong, Qionghai Dai, Bain...
BMCBI
2005
127views more  BMCBI 2005»
13 years 5 months ago
Dynamic modeling of cis-regulatory circuits and gene expression prediction via cross-gene identification
Background: Gene expression programs depend on recognition of cis elements in promoter region of target genes by transcription factors (TFs), but how TFs regulate gene expression ...
Li-Hsieh Lin, Hsiao-Ching Lee, Wen-Hsiung Li, Bor-...