Sciweavers

895 search results - page 160 / 179
» Health care information systems
Sort
View
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
15 years 1 months ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...
ICCV
2007
IEEE
15 years 11 months ago
Unsupervised Joint Alignment of Complex Images
Many recognition algorithms depend on careful positioning of an object into a canonical pose, so the position of features relative to a fixed coordinate system can be examined. Cu...
Gary B. Huang, Vidit Jain, Erik G. Learned-Miller
MHCI
2009
Springer
15 years 4 months ago
Ubikequitous computing: designing interactive experiences for cyclists
This paper charts the distinctive challenges of designing mobile experiences for cyclists and presents two studies of mobile cyclebased experiences: one a heritage tour; the other...
Duncan Rowland, Martin Flintham, Leif Oppermann, J...
121
Voted
INFOCOM
2007
IEEE
15 years 3 months ago
Distributed Relay Selection and Power Control for Multiuser Cooperative Communication Networks Using Buyer/Seller Game
— The performances in cooperative communications depend on careful resource allocation such as relay selection and power control, but traditional centralized resource allocation ...
Beibei Wang, Zhu Han, K. J. Ray Liu
STORAGESS
2006
ACM
15 years 3 months ago
Limiting trust in the storage stack
We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on ...
Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea...