Sciweavers

2281 search results - page 205 / 457
» Security Patterns and Secure Systems Design
Sort
View
98
Voted
MOBISYS
2009
ACM
16 years 1 months ago
mFerio: the design and evaluation of a peer-to-peer mobile payment system
In this paper, we present the design and evaluation of a nearfield communication-based mobile p2p payment application called mFerio which is designed to replace cash-based transac...
Rajesh Krishna Balan, Narayan Ramasubbu, Komsit Pr...
OOPSLA
2007
Springer
15 years 7 months ago
Recursive adaptive computations using perobject visitors
Adaptive Programming allows developers to write structureshy programs. However, in Adaptive Programming, recursive computations are known to require a good deal of boiler plate co...
Ahmed Abdelmeged, Karl J. Lieberherr
DAC
2009
ACM
15 years 7 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
115
Voted
GLVLSI
2003
IEEE
202views VLSI» more  GLVLSI 2003»
15 years 6 months ago
System level design of real time face recognition architecture based on composite PCA
Design and implementation of a fast parallel architecture based on an improved principal component analysis (PCA) method called Composite PCA suitable for real-time face recogniti...
Rajkiran Gottumukkal, Vijayan K. Asari
89
Voted
APSCC
2008
IEEE
15 years 7 months ago
Design of MyServer: A Residential Server in Smart Home Systems
This paper addresses the design and implementtation of a residential gateway: MyServer, which is to provide services regarding home security, inventory tracking, facility manageme...
Wei-Chung Teng, Yu-Chun Pao, Sheng-Luen Chung