Sciweavers

110 search results - page 4 / 22
» Turning Teenagers into Stores
Sort
View
CIS
2004
Springer
15 years 3 months ago
Fast Query Over Encrypted Character Data in Database
There are a lot of very important data in database, which need to be protected from attacking. Cryptographic support is an important mechanism of securing them. People, however, mu...
Zheng-Fei Wang, Jing Dai, Wei Wang 0009, Baile Shi
ACISP
2008
Springer
15 years 3 months ago
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
Sebastian Gajek, Mark Manulis, Jörg Schwenk
IROS
2006
IEEE
172views Robotics» more  IROS 2006»
15 years 3 months ago
An autonomous, underactuated exoskeleton for load-carrying augmentation
- Metabolic studies have shown that there is a metabolic cost associated with carrying load [1]. In previous work, a lightweight, underactuated exoskeleton has been described that ...
Conor James Walsh, Kenneth Pasch, Hugh M. Herr
ASAP
2003
IEEE
107views Hardware» more  ASAP 2003»
15 years 2 months ago
Energy Aware Register File Implementation through Instruction Predecode
The register file is a power-hungry device in modern architectures. Current research on compiler technology and computer architectures encourages the implementation of larger dev...
José L. Ayala, Marisa Luisa López-Va...
POPL
2004
ACM
15 years 10 months ago
Polymorphic typed defunctionalization
Defunctionalization is a program transformation that aims to turn a higher-order functional program into a first-order one, that is, to eliminate the use of functions as first-cla...
François Pottier, Nadji Gauthier