Sciweavers

557 search results - page 15 / 112
» Two experiences designing for effective security
Sort
View
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
15 years 6 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
ECSCW
2001
15 years 1 months ago
The effects of network delays on group work in real-time groupware
Network delays are a fact of life when using real-time groupware over a wide area network such as the Internet. This paper looks at how network delays affect closelycoupled group w...
Carl Gutwin
HOST
2008
IEEE
15 years 6 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris
TE
2010
70views more  TE 2010»
14 years 6 months ago
A Cost-Effective Atomic Force Microscope for Undergraduate Control Laboratories
Abstract--This paper presents a simple, cost-effective and robust atomic force microscope (AFM), which has been purposely designed and built for use as a teaching aid in undergradu...
Colin N. Jones, Jorge Gonçalves
ISESE
2003
IEEE
15 years 5 months ago
An Experimental Evaluation of Inspection and Testing for Detection of Design Faults
The two most common strategies for verification and validation, inspection and testing, are in a controlled experiment evaluated in terms of their fault detection capabilities. Th...
Carina Andersson, Thomas Thelin, Per Runeson, Nina...