Sciweavers

6031 search results - page 1091 / 1207
» Communicating Transaction Processes
Sort
View
148
Voted
TC
2008
15 years 3 months ago
Secure Memory Accesses on Networks-on-Chip
Security is gaining relevance in the development of embedded devices. Toward a secure system at each level of design, this paper addresses security aspects related to Network-on-Ch...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
132
Voted
TCS
2008
15 years 3 months ago
A timed semantics of Orc
Orc is a kernel language for structured concurrent programming. Orc provides three powerful combinators that define the structure of a concurrent computation. These combinators su...
Ian Wehrman, David Kitchin, William R. Cook, Jayad...
143
Voted
TDSC
2008
121views more  TDSC 2008»
15 years 3 months ago
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission
In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors pri...
Jing Deng, Yunghsiang S. Han
130
Voted
TIFS
2008
145views more  TIFS 2008»
15 years 3 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
165
Voted
TIP
2008
256views more  TIP 2008»
15 years 3 months ago
Image-Based Human Age Estimation by Manifold Learning and Locally Adjusted Robust Regression
Estimating human age automatically via facial image analysis has lots of potential real-world applications, such as human computer interaction and multimedia communication. However...
Guodong Guo, Yun Fu, Charles R. Dyer, Thomas S. Hu...
« Prev « First page 1091 / 1207 Last » Next »