Sciweavers

991 search results - page 45 / 199
» Foundations for Designing Secure Architectures
Sort
View
CODES
2005
IEEE
15 years 3 months ago
An architectural level design methodology for embedded face detection
Face detection and recognition research has attracted great attention in recent years. Automatic face detection has great potential in a large array of application areas, includin...
Vida Kianzad, Sankalita Saha, Jason Schlessman, Ga...
ECAI
2010
Springer
14 years 11 months ago
ABA: Argumentation Based Agents
Abstract. Many works have identified the potential benefits of using argumentation to address a large variety of multiagent problems. In this paper we take this idea one step furth...
Antonis C. Kakas, Leila Amgoud, Gabriele Kern-Isbe...
IPPS
2002
IEEE
15 years 2 months ago
Research and Design of a Middleware for Supporting Wide-Area Distributed Applications
As the platform for wide-area distributed applications, the middleware architecture should support adaptability, scalability, mobility, reliability and security. However, current ...
Dong Zhao, Shaowen Yao, Mingtian Zhou
PET
2010
Springer
15 years 1 months ago
Drac: An Architecture for Anonymous Low-Volume Communications
We present Drac, a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary. The...
George Danezis, Claudia Díaz, Carmela Tronc...
DSD
2005
IEEE
104views Hardware» more  DSD 2005»
15 years 3 months ago
Design of Transport Triggered Architecture Processors for Wireless Encryption
Transport Triggered Architecture (TTA) offers a costeffective trade-off between the size and performance of ASICs and the programmability of general-purpose processors. In this pa...
Panu Hämäläinen, Jari Heikkinen, Ma...