Sciweavers

5722 search results - page 235 / 1145
» Security Function Interactions
Sort
View
ICIAP
2005
ACM
16 years 3 months ago
3D Functional Models of Monkey Brain Through Elastic Registration of Histological Sections
In this paper we describe a method for the reconstruction and visualization of functional models of monkey brains. Models are built through the registration of high resolution imag...
Fabio Bettio, Francesca Frexia, Andrea Giachetti, ...
CAISE
2008
Springer
15 years 5 months ago
Improving Data Independence, Efficiency and Functional Flexibility of Integration Platforms
The concept of Enterprise Application Integration (EAI) is widely used for integrating heterogeneous applications and systems by message-based communication. Typically, EAI servers...
Matthias Böhm, Jürgen Bittner, Dirk Habi...
SIAMMA
2010
97views more  SIAMMA 2010»
14 years 9 months ago
Small Volume Fraction Limit of the Diblock Copolymer Problem: I. Sharp-Interface Functional
We present the first of two articles on the small volume fraction limit of a nonlocal Cahn-Hilliard functional introduced to model microphase separation of diblock copolymers. Her...
Rustum Choksi, Mark A. Peletier
ICCAD
2008
IEEE
130views Hardware» more  ICCAD 2008»
15 years 12 months ago
Lightweight secure PUFs
— To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design. Our approach employs int...
Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potk...
ICASSP
2008
IEEE
15 years 9 months ago
On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme
The steganographic security in the Cachin’s work is defined as the statistical invisibility between the host signal and its marked version. At contrary, the robustness to an at...
Sofiane Braci, Rémy Boyer, Claude Delpha