Sciweavers

485 search results - page 74 / 97
» Embedded intelligent SRAM
Sort
View
169
Voted
GRC
2007
IEEE
15 years 10 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
146
Voted
MUE
2007
IEEE
102views Multimedia» more  MUE 2007»
15 years 10 months ago
Ubiquitous Multimedia Information Delivering Service for Smart Home
In ubiquitous computing environments like smart home, residents can conveniently enjoy various home entertainments, such as watching TV, listening music, etc, through invisible an...
Jenq-Muh Hsu, Wei-Juing Wu, I-Ray Chang
120
Voted
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
15 years 9 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
133
Voted
EMSOFT
2004
Springer
15 years 9 months ago
Making mechatronic agents resource-aware in order to enable safe dynamic resource allocation
Mechatronic systems are embedded software systems with hard real-time requirements. Predictability is of paramount importance for these systems. Thus, their design has to take the...
Sven Burmester, Matthias Gehrke, Holger Giese, Sim...
137
Voted
DRM
2003
Springer
15 years 9 months ago
Constructing a virtual primary key for fingerprinting relational data
Agrawal and Kiernan’s watermarking technique for database relations [1] and Li et al’s fingerprinting extension [6] both depend critically on primary key attributes. Hence, t...
Yingjiu Li, Vipin Swarup, Sushil Jajodia