Sciweavers

5722 search results - page 248 / 1145
» Security Function Interactions
Sort
View
ASPDAC
2010
ACM
163views Hardware» more  ASPDAC 2010»
15 years 1 months ago
A PUF design for secure FPGA-based embedded systems
The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application in areas such as embedded systems security, and IP/IC counterpiracy...
Jason Helge Anderson
INFORMATICALT
2010
132views more  INFORMATICALT 2010»
15 years 11 days ago
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen
CEC
2007
IEEE
15 years 9 months ago
N-gram fitness function with a constraint in a musical evolutionary system
—This paper describes an evolutionary music composition system that combines trainable music critics with a bag of notes constraint. Unlike many evolutionary composition systems,...
Man Yat Lo, Simon M. Lucas
AADEBUG
1997
Springer
15 years 7 months ago
Debugging Optimised Code Using Function Interpretation
Previously the debugging of optimised code has not been possible without recompiling the executable code and preventing the use of code optimisation techniques. Although current r...
Kim Elms
ATAL
2010
Springer
15 years 4 months ago
Developing high-level cognitive functions for service robots
The primary target of this work is human-robot collaboration, especially for service robots in complicated application scenarios. Three assumptions and four requirements are ident...
Xiaoping Chen, Jianmin Ji, Jiehui Jiang, Guoqiang ...