Sciweavers

3256 search results - page 551 / 652
» Integrated Environment for Embedded Control Systems Design
Sort
View
ICC
2007
IEEE
154views Communications» more  ICC 2007»
15 years 10 months ago
A Policy-Based Approach for Managing Ubiquitous Networks in Urban Spaces
— Modern cities are becoming increasingly networked Network Operator and the Service Providers can introduce environments and a plethora of computing equipment interacts their ow...
Antonis M. Hadjiantonis, Marinos Charalambides, Ge...
157
Voted
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
15 years 7 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...
145
Voted
SENSYS
2005
ACM
15 years 9 months ago
Data collection, storage, and retrieval with an underwater sensor network
In this paper we present a novel platform for underwater sensor networks to be used for long-term monitoring of coral reefs and fisheries. The sensor network consists of static a...
Iuliu Vasilescu, Keith Kotay, Daniela Rus, Matthew...
127
Voted
SACMAT
2009
ACM
15 years 10 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
117
Voted
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 2 months ago
A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider
Making backup is so cumbersome and expensive that individuals hardly ever backup their data and companies usually duplicate their data into a secondary server. This paper proposes...
Houssem Jarraya, Maryline Laurent