Sciweavers

406 search results - page 51 / 82
» Constraints on Strong Generative Power
Sort
View
88
Voted
WSC
2004
15 years 2 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
121
Voted
SIGMOD
2010
ACM
436views Database» more  SIGMOD 2010»
15 years 29 days ago
Pluggable personal data servers
An increasing amount of personal data is automatically gathered on servers by administrations, hospitals and private companies while several security surveys highlight the failure...
Nicolas Anciaux, Luc Bouganim, Yanli Guo, Philippe...
112
Voted
TSP
2010
14 years 7 months ago
Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems
Abstract--This paper proposes a training-based channel estimation scheme for achieving quality-of-service discrimination between legitimate and unauthorized receivers in wireless m...
Tsung-Hui Chang, Wei-Cheng Chiang, Yao-Win Peter H...
CASES
2007
ACM
15 years 4 months ago
Application driven embedded system design: a face recognition case study
The key to increasing performance without a commensurate increase in power consumption in modern processors lies in increasing both parallelism and core specialization. Core speci...
Karthik Ramani, Al Davis
130
Voted
IANDC
2008
105views more  IANDC 2008»
15 years 24 days ago
Symbolic protocol analysis for monoidal equational theories
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we t...
Stéphanie Delaune, Pascal Lafourcade, Denis...