Sciweavers

8600 search results - page 1555 / 1720
» Measuring with Timed Patterns
Sort
View
127
Voted
DAC
2008
ACM
15 years 5 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
131
Voted
BCSHCI
2007
15 years 5 months ago
Exploring potential usability gaps when switching mobile phones: an empirical study
The present study explores potential usability gaps when users switch from a familiar to an unfamiliar mobile phone interface. A within-subject experiment was performed in which n...
Aiko Fallas Yamashita, Wolmet Barendregt, Morten F...
163
Voted
AVI
2010
15 years 5 months ago
Wakame: sense making of multi-dimensional spatial-temporal data
As our ability to measure the world around us improves, we are quickly generating massive quantities of high-dimensional, spatial-temporal data. In this paper, we concern ourselve...
Clifton Forlines, Kent Wittenburg
197
Voted
SBBD
2008
256views Database» more  SBBD 2008»
15 years 4 months ago
Indexing Internal Memory with Minimal Perfect Hash Functions
A perfect hash function (PHF) is an injective function that maps keys from a set S to unique values, which are in turn used to index a hash table. Since no collisions occur, each k...
Fabiano C. Botelho, Hendrickson R. Langbehn, Guilh...
140
Voted
CSREASAM
2003
15 years 4 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
« Prev « First page 1555 / 1720 Last » Next »