Sciweavers

9186 search results - page 1278 / 1838
» A Module System for Scheme
Sort
View
FPL
2003
Springer
88views Hardware» more  FPL 2003»
15 years 10 months ago
How Secure Are FPGAs in Cryptographic Applications?
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPG...
Thomas J. Wollinger, Christof Paar
163
Voted
GCC
2003
Springer
15 years 10 months ago
SemanticPeer: An Ontology-Based P2P Lookup Service
Locating content efficiently and conveniently is the key issue in P2P systems. In this paper we present SemanticPeer, an Ontology-Based P2P lookup service, to address this problem,...
Jing Tian, Yafei Dai, Xiaoming Li
132
Voted
TRUST
2010
Springer
15 years 10 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
ISWC
2002
IEEE
15 years 10 months ago
Multi-Sensor Context Aware Clothing
Inspired by perception in biological systems, distribution of a massive amount of simple sensing devices is gaining more support in detection applications. A focus on fusion of se...
Kristof Van Laerhoven, Albrecht Schmidt, Hans-Wern...
RTSS
2002
IEEE
15 years 10 months ago
Analysis of a Reservation-Based Feedback Scheduler
When executing soft real-time tasks in a shared processor, it is important to properly allocate the computational resources such that the quality of service requirements of each t...
Luca Abeni, Luigi Palopoli, Giuseppe Lipari, Jonat...
« Prev « First page 1278 / 1838 Last » Next »