Sciweavers

4511 search results - page 22 / 903
» Observation Based System Security
Sort
View
ICANN
2007
Springer
15 years 8 months ago
A Simple Model of Cortical Activations During Both Observation and Execution of Reach-to-Grasp Movements
We discuss evidence for the existence of mirror systems in the brain, including recent experimental results that demonstrate the use of shared pathways for the observation and exec...
Matthew Hartley, John G. Taylor
125
Voted
ICC
2009
IEEE
130views Communications» more  ICC 2009»
14 years 11 months ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...
CASES
2005
ACM
15 years 3 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
111
Voted
BIRTHDAY
2005
Springer
15 years 7 months ago
Observing Reductions in Nominal Calculi Via a Graphical Encoding of Processes
The paper introduces a novel approach to the synthesis of labelled transition systems for calculi with name mobility. The proposal is based on a graphical encoding: Each process is...
Fabio Gadducci, Ugo Montanari
MEDIAFORENSICS
2010
15 years 3 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine