Sciweavers

604 search results - page 61 / 121
» Efficient Computation of Multiplicative Inverses for Cryptog...
Sort
View
BROADNETS
2006
IEEE
15 years 3 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
DSN
2004
IEEE
15 years 1 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
CVPR
2004
IEEE
15 years 12 months ago
Difference Sphere: An Approach to Near Light Source Estimation
We present a novel approach for estimating light sources from a single image of a scene that is illuminated by major near point light sources, a few directional light sources and ...
Takeshi Takai, Koichiro Niinuma, Atsuto Maki, Taka...
CODES
2006
IEEE
15 years 1 months ago
Increasing hardware efficiency with multifunction loop accelerators
To meet the conflicting goals of high-performance low-cost embedded systems, critical application loop nests are commonly executed on specialized hardware accelerators. These loop...
Kevin Fan, Manjunath Kudlur, Hyunchul Park, Scott ...
SAC
2008
ACM
14 years 9 months ago
Test generation and minimization with "basic" statecharts
Model-based testing as a black-box testing technique has grown in importance. The models used represent the relevant features of the system under consideration (SUC), and can also...
Fevzi Belli, Axel Hollmann