Sciweavers

154 search results - page 25 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
MM
1993
ACM
113views Multimedia» more  MM 1993»
15 years 1 months ago
The Vidboard: A Video Capture and Processing Peripheral for a Distributed Multimedia System
This paper describes a stand-alone network-based video capture and processing peripheral (the Vidboard) for a distributed multimedia system centered around a gigabit-per-second As...
Joel F. Adam, David L. Tennenhouse
DAC
2007
ACM
15 years 1 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
FPL
2008
Springer
175views Hardware» more  FPL 2008»
14 years 11 months ago
File system access from reconfigurable FPGA hardware processes in BORPH
This paper presents the design and implementation of BORPH's kernel file system layer that provides FPGA processes direct access to the general file system. Using a semantics...
Hayden Kwok-Hay So, Robert W. Brodersen
BCSHCI
2008
14 years 11 months ago
Creating creative processes: a workshop demonstrating a methodological approach for subjects between the sciences and the arts
There is a lack of `explicit education' of different modes of creativity and different methodologies for initiating creative processes. This is important for not only art pra...
Carola Boehm
ICAI
2008
14 years 11 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang