Sciweavers

2517 search results - page 164 / 504
» Secure Deployment of Components
Sort
View
FSE
2006
Springer
107views Cryptology» more  FSE 2006»
15 years 7 months ago
Some Plausible Constructions of Double-Block-Length Hash Functions
Abstract. In this article, it is discussed how to construct a compression function with 2n-bit output using a component function with n-bit output. The component function is either...
Shoichi Hirose
140
Voted
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
129
Voted
APVIS
2001
15 years 5 months ago
Interaction Modes for Augmented Reality Visualization
In this paper we describe a novel use of augmented reality for information visualization. We detail the use of augmented reality as a component of InVision -- an open framework fo...
Hannah Slay, Matthew Phillips, Rudi Vernik, Bruce ...
CORR
2004
Springer
99views Education» more  CORR 2004»
15 years 3 months ago
Performance Analysis of the Globus Toolkit Monitoring and Discovery Service, MDS2
Monitoring and information services form a key component of a distributed system, or Grid. A quantitative study of such services can aid in understanding the performance limitatio...
Xuehai Zhang, Jennifer M. Schopf
DATE
2009
IEEE
137views Hardware» more  DATE 2009»
15 years 10 months ago
Componentizing hardware/software interface design
Abstract—Building highly optimized embedded systems demands hardware/software (HW/SW) co-design. A key challenge in co-design is the design of HW/SW interfaces, which is often a ...
Kecheng Hao, Fei Xie