Sciweavers

9186 search results - page 1405 / 1838
» A Module System for Scheme
Sort
View
WWW
2005
ACM
16 years 4 months ago
Migrating web application sessions in mobile computing
The capability to change user agent while working is starting to appear in state of the art mobile computing due to the proliferation of different kinds of devices, ranging from p...
Gerardo Canfora, Giuseppe Di Santo, Gabriele Ventu...
ESORICS
2009
Springer
16 years 4 months ago
ID-Based Secure Distance Bounding and Localization
In this paper, we propose a novel ID-based secure distance bounding protocol. Unlike traditional secure distance measurement protocols, our protocol is based on standard insecure d...
Nils Ole Tippenhauer, Srdjan Capkun
ICCAD
2008
IEEE
103views Hardware» more  ICCAD 2008»
16 years 1 months ago
Hardware protection and authentication through netlist level obfuscation
—Hardware Intellectual Property (IP) cores have emerged as an integral part of modern System–on–Chip (SoC) designs. However, IP vendors are facing major challenges to protect...
Rajat Subhra Chakraborty, Swarup Bhunia
ISBI
2009
IEEE
15 years 11 months ago
Reduction of Distortions in MRSI Using a New Signal Model
We propose a new reconstruction scheme for magnetic resonance spectroscopic imaging (MRSI) signal based on minimizing the spatial total variation (TV) integrated with the 1 -norm ...
Ramin Eslami, Mathews Jacob
BIRTHDAY
2009
Springer
15 years 11 months ago
Reasoning About Alternative Requirements Options
This paper elaborates on some of the fundamental contributions made by John Mylopoulos in the area of Requirements Engineering. We specifically focus on the use of goal models and ...
Axel van Lamsweerde
« Prev « First page 1405 / 1838 Last » Next »