Sciweavers

188 search results - page 9 / 38
» Developing a Hardware Evaluation Method for SHA-3 Candidates
Sort
View
SENSYS
2004
ACM
15 years 2 months ago
Hardware design experiences in ZebraNet
The enormous potential for wireless sensor networks to make a positive impact on our society has spawned a great deal of research on the topic, and this research is now producing ...
Pei Zhang, Christopher M. Sadler, Stephen A. Lyon,...
ACSAC
2003
IEEE
15 years 1 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...
LREC
2010
157views Education» more  LREC 2010»
14 years 11 months ago
Indexing Methods for Faster and More Effective Person Name Search
This paper compares several indexing methods for person names extracted from text, developed for an information retrieval system with requirements for fast approximate matching of...
Mark Arehart
ICCAD
1994
IEEE
80views Hardware» more  ICCAD 1994»
15 years 1 months ago
Macromodeling of analog circuits for hierarchical circuit design
{ Hierarchy plays a signi cant role in the design of digital and analog circuits. At each level of the hierarchy it becomes essential to evaluate if a sub-block design is feasible ...
Jianfeng Shao, Ramesh Harjani
ROMAN
2007
IEEE
156views Robotics» more  ROMAN 2007»
15 years 3 months ago
Development and User Testing of the Gestural Joystick for Gloves-On Hazardous Environments
— For controlling robots in an urban search and rescue (USAR) application, we present a wearable joystick with improved sensing capability as well as Giant MagnetoResistance(GMR)...
Jaewook Bae, Amy C. Larson, Richard M. Voyles, Roy...