Sciweavers

24529 search results - page 4754 / 4906
» Computing on Authenticated Data
Sort
View
EWSN
2010
Springer
16 years 17 days ago
Phoenix: An Epidemic Approach to Time Reconstruction
Abstract. Harsh deployment environments and uncertain run-time conditions create numerous challenges for postmortem time reconstruction methods. For example, motes often reboot and...
Jayant Gupchup, Douglas Carlson, Razvan Musaloiu-E...
EWSN
2010
Springer
16 years 17 days ago
Selective Reprogramming of Mobile Sensor Networks through Social Community Detection
Abstract. We target application domains where the behavior of animals or humans is monitored using wireless sensor network (WSN) devices. The code on these devices is updated frequ...
Bence Pásztor, Luca Mottola, Cecilia Mascol...
ALT
2005
Springer
16 years 13 days ago
Non U-Shaped Vacillatory and Team Learning
U-shaped learning behaviour in cognitive development involves learning, unlearning and relearning. It occurs, for example, in learning irregular verbs. The prior cognitive science...
Lorenzo Carlucci, John Case, Sanjay Jain, Frank St...
117
Voted
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
16 years 13 days ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
134
Voted
ICCAD
2006
IEEE
139views Hardware» more  ICCAD 2006»
16 years 11 days ago
Analog placement with symmetry and other placement constraints
In order to handle device matching in analog circuits, some pairs of modules are required to be placed symmetrically. This paper addresses this device-level placement problem for ...
Yiu-Cheong Tam, Evangeline F. Y. Young, Chris C. N...
« Prev « First page 4754 / 4906 Last » Next »