Sciweavers

5722 search results - page 481 / 1145
» Security Function Interactions
Sort
View
CONEXT
2008
ACM
15 years 6 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
142
Voted
FPL
2010
Springer
129views Hardware» more  FPL 2010»
15 years 2 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
CHI
2005
ACM
16 years 5 months ago
Collective efficacy as a measure of community
As human-computer interaction increasingly focuses on mediated interactions among groups of individuals, there is a need to develop techniques for measurement and analysis of grou...
John M. Carroll, Mary Beth Rosson, Jingying Zhou
TEI
2010
ACM
129views Hardware» more  TEI 2010»
15 years 11 months ago
TextDraw: a prototype for gestural typesetting
This paper considers a new approach that allows for the creation of typographic works through gestural interaction. It describes a prototype application called TextDraw, which is ...
Travis Kirton, Pamela Jennings, Hideaki Ogawa
AB
2007
Springer
15 years 11 months ago
Relating Attractors and Singular Steady States in the Logical Analysis of Bioregulatory Networks
Abstract. In 1973 R. Thomas introduced a logical approach to modeling and analysis of bioregulatory networks. Given a set of Boolean functions describing the regulatory interaction...
Heike Siebert, Alexander Bockmayr