Sciweavers

8655 search results - page 1406 / 1731
» Challenges for Trusted Computing
Sort
View
SIGMOD
2002
ACM
127views Database» more  SIGMOD 2002»
15 years 3 months ago
Workflow management with service quality guarantees
Workflow management systems (WFMS) that are geared for the orchestration of business processes across multiple organizations are complex distributed systems: they consist of multi...
Michael Gillmann, Gerhard Weikum, Wolfgang Wonner
130
Voted
TCAD
2002
146views more  TCAD 2002»
15 years 3 months ago
Static scheduling of multidomain circuits for fast functional verification
With the advent of system-on-a-chip design, many application specific integrated circuits (ASICs) now require multiple design clocks that operate asynchronously to each other. This...
Murali Kudlugi, Russell Tessier
165
Voted
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 3 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
116
Voted
NETWORK
2007
100views more  NETWORK 2007»
15 years 3 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...
PR
2007
127views more  PR 2007»
15 years 3 months ago
Face recognition using spectral features
Face recognition is a challenging task in computer vision and pattern recognition. It is well-known that obtaining a low-dimensional feature representation with enhanced discrimin...
Fei Wang, Jingdong Wang, Changshui Zhang, James T....
« Prev « First page 1406 / 1731 Last » Next »