Sciweavers

7853 search results - page 1538 / 1571
» Learning from Each Other
Sort
View
85
Voted
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
15 years 3 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
INFOCOM
2003
IEEE
15 years 3 months ago
Sensor-Centric Quality of Routing in Sensor Networks
Abstract— Standard embeded sensor nework models emphasize energy efficiency and distributed decision-making by considering untethered and unattended sensors. To this we add two ...
Rajgopal Kannan, Sudipta Sarangi, S. Sitharama Iye...
70
Voted
ITC
2003
IEEE
157views Hardware» more  ITC 2003»
15 years 3 months ago
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
Ramesh Karri, Grigori Kuznetsov, Michael Göss...
ICAIL
2003
ACM
15 years 3 months ago
Positive and Negative Expectations and the Deontic Nature of Social Conventions
The general goal of the paper is to show the normative/deontic nature of conventions. Conventions are traditionally defined as regularity of behavior based on expectations evolved...
Cristiano Castelfranchi, Luca Tummolini
FPGA
2003
ACM
156views FPGA» more  FPGA 2003»
15 years 3 months ago
Architectures and algorithms for synthesizable embedded programmable logic cores
As integrated circuits become more and more complex, the ability to make post-fabrication changes will become more and more attractive. This ability can be realized using programm...
Noha Kafafi, Kimberly Bozman, Steven J. E. Wilton
« Prev « First page 1538 / 1571 Last » Next »