Sciweavers

1368 search results - page 205 / 274
» Challenges for Model-Integrating Components
Sort
View
DAC
2009
ACM
15 years 1 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
123
Voted
ICCV
2009
IEEE
15 years 1 months ago
SCRAMSAC: Improving RANSAC's efficiency with a spatial consistency filter
Geometric verification with RANSAC has become a crucial step for many local feature based matching applications. Therefore, the details of its implementation are directly relevant...
Torsten Sattler, Bastian Leibe, Leif Kobbelt
ICUMT
2009
15 years 1 months ago
Service and Resource Discovery supports over P2P overlays
We describe the main architecture and the design principles of the Service/Resource Discovery System (SRDS), a component of the XtreemOS Operating System. XtreemOS is a Linux exten...
Emanuele Carlini, Massimo Coppola, Patrizio Dazzi,...
ICWSM
2009
15 years 1 months ago
Trust Incident Account Model: Preliminary Indicators for Trust Rhetoric and Trust or Distrust in Blogs
This paper defines a concept of trust incident accounts as verbal reports of empirical episodes in which a trustor has reached a state of positive or negative expectations of a tr...
Victoria L. Rubin
CACM
2010
97views more  CACM 2010»
15 years 1 months ago
Certified software
Certified software consists of a machine-executable program plus a formal machine-checkable proof that the software is free of bugs with respect to a claim of dependability. The c...
Zhong Shao