Sciweavers

233 search results - page 41 / 47
» Remote customization of systems code for embedded devices
Sort
View
WWW
2010
ACM
15 years 6 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
CHI
2004
ACM
16 years 4 days ago
Z-Tiles: building blocks for modular, pressure-sensing floorspaces
A new interactive floorspace has been developed which uses modular nodes connected together to create a pressuresensitive area of varying size and shape, giving it the potential t...
Bruce Richardson, Joseph A. Paradiso, Krispin Leyd...
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 6 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
CODES
2007
IEEE
15 years 6 months ago
Thread warping: a framework for dynamic synthesis of thread accelerators
We present a dynamic optimization technique, thread warping, that uses a single processor on a multiprocessor system to dynamically synthesize threads into custom accelerator circ...
Greg Stitt, Frank Vahid
AAECC
2003
Springer
139views Algorithms» more  AAECC 2003»
15 years 5 months ago
Fighting Two Pirates
A pirate is a person who buys a legal copy of a copyrighted work and who reproduces it to sell illegal copies. Artists and authors are worried as they do not get the income which i...
Hans Georg Schaathun