Sciweavers

482 search results - page 97 / 97
» Architecture-level performance evaluation of component-based...
Sort
View
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
13 years 10 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
SIGCOMM
2010
ACM
13 years 6 months ago
NeuroPhone: brain-mobile phone interface using a wireless EEG headset
Neural signals are everywhere just like mobile phones. We propose to use neural signals to control mobile phones for hands-free, silent and effortless human-mobile interaction. Un...
Andrew T. Campbell, Tanzeem Choudhury, Shaohan Hu,...