Sciweavers

2875 search results - page 316 / 575
» Using separation of concerns for embedded systems design
Sort
View
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
15 years 5 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
ITS
1998
Springer
107views Multimedia» more  ITS 1998»
15 years 9 months ago
Toward a Unification of Human-Computer Learning and Tutoring
We define a learning tutor as being an intelligent agent that learns from human tutors and then tutors human learners. The notion of a learning tutor provides a conceptual framewor...
Henry Hamburger, Gheorghe Tecuci
136
Voted
CN
2010
149views more  CN 2010»
15 years 5 months ago
An automatic HTTP cookie management system
HTTP cookies have been widely used for maintaining session states, personalizing, authenticating, and tracking user behaviors. Despite their importance and usefulness, cookies hav...
Chuan Yue, Mengjun Xie, Haining Wang
149
Voted
IPM
2007
143views more  IPM 2007»
15 years 5 months ago
QCS: A system for querying, clustering and summarizing documents
Information retrieval systems consist of many complicated components. Research and development of such systems is often hampered by the difficulty in evaluating how each particula...
Daniel M. Dunlavy, Dianne P. O'Leary, John M. Conr...
180
Voted
INFOCOM
2011
IEEE
14 years 8 months ago
SocialFilter: Introducing social trust to collaborative spam mitigation
—We propose SocialFilter, a trust-aware collaborative spam mitigation system. Our proposal enables nodes with no email classification functionality to query the network on wheth...
Michael Sirivianos, Kyungbaek Kim, Xiaowei Yang