Sciweavers

13734 search results - page 2671 / 2747
» Abstractions of data types
Sort
View
141
Voted
ESORICS
2009
Springer
15 years 11 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
136
Voted
PAM
2009
Springer
15 years 11 months ago
On the 95-Percentile Billing Method
Abstract. The 95-percentile method is used widely for billing ISPs and websites. In this work, we characterize important aspects of the 95-percentile method using a large set of tr...
Xenofontas A. Dimitropoulos, Paul Hurley, Andreas ...
142
Voted
SAS
2009
Springer
149views Formal Methods» more  SAS 2009»
15 years 11 months ago
Creating Transformations for Matrix Obfuscation
There are many programming situations where it would be convenient to conceal the meaning of code, or the meaning of certain variables. This can be achieved through program transfo...
Stephen Drape, Irina Voiculescu
CODES
2009
IEEE
15 years 11 months ago
An on-chip interconnect and protocol stack for multiple communication paradigms and programming models
A growing number of applications, with diverse requirements, are integrated on the same System on Chip (SoC) in the form of hardware and software Intellectual Property (IP). The d...
Andreas Hansson, Kees Goossens
140
Voted
CSE
2009
IEEE
15 years 11 months ago
Prospector: Multiscale Energy Measurement of Networked Embedded Systems with Wideband Power Signals
Abstract—Today’s wirelessly networked embedded systems underlie a vast array of electronic devices, performing computation, communication, and input/output. A major design goal...
Kenji R. Yamamoto, Paul G. Flikkema
« Prev « First page 2671 / 2747 Last » Next »