Sciweavers

2429 search results - page 280 / 486
» Using Aspects to Design a Secure System
Sort
View
CORR
2004
Springer
104views Education» more  CORR 2004»
15 years 3 months ago
Near Rationality and Competitive Equilibria in Networked Systems
A growing body of literature in networked systems research relies on game theory and mechanism design to model and address the potential lack of cooperation between self-intereste...
Nicolas Christin, Jens Grossklags, John Chuang
CSCW
2004
ACM
15 years 8 months ago
List making in the home
This paper presents research on the use of household lists. Drawing on an ethnographic study of mothers’ work, it focuses on the centrality of paper lists in home- and child-car...
Alex S. Taylor, Laurel Swan
PERVASIVE
2004
Springer
15 years 8 months ago
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity
Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to tak...
Christian Decker, Michael Beigl, Albert Krohn, Phi...
ICCAD
2008
IEEE
103views Hardware» more  ICCAD 2008»
16 years 3 days ago
Hardware protection and authentication through netlist level obfuscation
—Hardware Intellectual Property (IP) cores have emerged as an integral part of modern System–on–Chip (SoC) designs. However, IP vendors are facing major challenges to protect...
Rajat Subhra Chakraborty, Swarup Bhunia
MM
1994
ACM
151views Multimedia» more  MM 1994»
15 years 7 months ago
Distributed Parallel Data Storage Systems: A Scalable Approach to High Speed Image Servers
We have designed, built, and analyzed a distributed parallel storage system that will supply image streams fast enough to permit multi-user, "real-time", video-like appl...
Brian Tierney, Jason Lee, Ling Tony Chen, Hanan He...