Sciweavers

6960 search results - page 1006 / 1392
» Continuity Analysis of Programs
Sort
View
SPATIALCOGNITION
2010
Springer
15 years 3 months ago
Human EEG Correlates of Spatial Navigation within Egocentric and Allocentric Reference Frames
We investigated the impact of path complexity on brain dynamics of subjects who preferentially use an egocentric (Turners) or an allocentric (Nonturners) reference frame during spa...
Markus Plank, Hermann J. Müller, Julie Onton,...
152
Voted
WICOMM
2010
91views more  WICOMM 2010»
15 years 3 months ago
A sensing-based cognitive coexistence method for interfering infrastructure and ad hoc systems
The rapid proliferation of wireless systems makes interference management more and more important. This paper presents a novel cognitive coexistence framework, which enables an in...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
ACSAC
2010
IEEE
15 years 2 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
ACSD
2010
IEEE
224views Hardware» more  ACSD 2010»
15 years 2 months ago
Robustness of Sequential Circuits
Digital components play a central role in the design of complex embedded systems. These components are interconnected with other, possibly analog, devices and the physical environm...
Laurent Doyen, Thomas A. Henzinger, Axel Legay, De...
ASIACRYPT
2010
Springer
15 years 2 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
« Prev « First page 1006 / 1392 Last » Next »