Sciweavers

1737 search results - page 310 / 348
» Hardware Support for Secure Processing in Embedded Systems
Sort
View
134
Voted
NDSS
2007
IEEE
15 years 10 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
107
Voted
IEEEPACT
2009
IEEE
15 years 10 months ago
Quantifying the Potential of Program Analysis Peripherals
Abstract—As programmers are asked to manage more complicated parallel machines, it is likely that they will become increasingly dependent on tools such as multi-threaded data rac...
Mohit Tiwari, Shashidhar Mysore, Timothy Sherwood
125
Voted
APVIS
2001
15 years 5 months ago
Visual Programs Module Choice and Layout in the Nord Modular Patch Language
The Nord Modular music synthesiser system comprises a standalone array of digital signal processors programmed by a dataflow visual langauage and supported by a visual programming...
James Noble, Robert Biddle
110
Voted
TVLSI
2008
92views more  TVLSI 2008»
15 years 3 months ago
Reconfigurable Architecture for Network Flow Analysis
This paper describes a reconfigurable architecture based on field-programmable gate-array (FPGA) technology for monitoring and analyzing network traffic at increasingly high networ...
Sherif Yusuf, Wayne Luk, Morris Sloman, Naranker D...
196
Voted

Book
338views
17 years 29 days ago
The Data Conversion Handbook
"The Data Conversion Handbook, edited by Walt Kester (Newnes, 2005), is written for design engineers who routinely use data converters and related circuitry. Comprising Data C...
Walt Kester