Sciweavers

683 search results - page 77 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
HICSS
2012
IEEE
265views Biometrics» more  HICSS 2012»
13 years 8 months ago
Change and Control Paradoxes in Mobile Infrastructure Innovation: The Android and iOS Mobile Operating Systems Cases
The advent of the smartphone as a highly complex technology has been accompanied by mobile operating systems (OS), large communities of developers, diverse content providers, and ...
David Tilson, Carsten Sørensen, Kalle Lyyti...
ETFA
2005
IEEE
15 years 6 months ago
Designing usable decision support systems for HVM
In High Volume Manufacturing (HVM), system control is shared between automation and human workers. The social organisation of workers plays an important role in supporting human d...
Connor Upton, Gavin Doherty
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
15 years 6 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
114
Voted
SIGMOD
2005
ACM
178views Database» more  SIGMOD 2005»
16 years 25 days ago
Towards Effective Indexing for Very Large Video Sequence Database
With rapid advances in video processing technologies and ever fast increments in network bandwidth, the popularity of video content publishing and sharing has made similarity sear...
Heng Tao Shen, Beng Chin Ooi, Xiaofang Zhou
128
Voted
AFRICACRYPT
2009
Springer
15 years 7 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...