Sciweavers

3955 search results - page 614 / 791
» Comparing the Power of Robots
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 10 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
CIARP
2005
Springer
15 years 10 months ago
Surface Grading Using Soft Colour-Texture Descriptors
Abstract. This paper presents a new approach to the question of surface grading based on soft colour-texture descriptors and well known classifiers. These descriptors come from gl...
Fernando López, José Miguel Valiente...
DCOSS
2005
Springer
15 years 10 months ago
TARA: Thermal-Aware Routing Algorithm for Implanted Sensor Networks
Implanted biological sensors are a special class of wireless sensor networks that are used in-vivo for various medical applications. One of the major challenges of continuous in-vi...
Qinghui Tang, Naveen Tummala, Sandeep K. S. Gupta,...
ER
2005
Springer
137views Database» more  ER 2005»
15 years 10 months ago
An Approach to Broaden the Semantic Coverage of ACL Speech Acts
Current speech-act based ACLs specify domain-independent information about communication and relegate domain-dependent information to an unspecified content language. This is reas...
Hong Jiang, Michael N. Huhns
FPL
2005
Springer
137views Hardware» more  FPL 2005»
15 years 10 months ago
Bitwise Optimised CAM for Network Intrusion Detection Systems
String pattern matching is a computationally expensive task, and when implemented in hardware, it can consume a large amount of resources for processing and storage. This paper pr...
Sherif Yusuf, Wayne Luk