Sciweavers

536 search results - page 67 / 108
» A computer verified, monadic, functional implementation of t...
Sort
View
ADHOCNOW
2008
Springer
15 years 6 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
ESMART
2001
Springer
15 years 4 months ago
Use of Biometrics for User Verification in Electronic Signature Smartcards
If a smartcard provides security functions such as electronic signature creation, valuables such as electronic money and/or sensitive data such as medical data, then the smartcard ...
Bruno Struif
SENSYS
2010
ACM
14 years 9 months ago
Adaptive decentralized control of underwater sensor networks for modeling underwater phenomena
Understanding the dynamics of bodies of water and their impact on the global environment requires sensing information over the full volume of water. We develop a gradientbased dec...
Carrick Detweiler, Marek Doniec, Mingshun Jiang, M...
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 3 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
GLVLSI
2009
IEEE
142views VLSI» more  GLVLSI 2009»
15 years 6 months ago
Hardware-accelerated gradient noise for graphics
A synthetic noise function is a key component of most computer graphics rendering systems. This pseudo-random noise function is used to create a wide variety of natural looking te...
Josef B. Spjut, Andrew E. Kensler, Erik Brunvand