Sciweavers

5962 search results - page 948 / 1193
» Working with Patterns and Code
Sort
View
121
Voted
ACSAC
2006
IEEE
15 years 10 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
AGILEDC
2006
IEEE
15 years 10 months ago
Embedded Agile Project by the Numbers With Newbies
There is a class of projects that can only be accomplished via agile practices due to their complexity and risks. It is rare for such a project to be staffed with newbies but it h...
Nancy Van Schooenderwoert
APCCAS
2006
IEEE
251views Hardware» more  APCCAS 2006»
15 years 10 months ago
Design of a Dynamic PCM Selector for Non-deterministic Environment
—The quality of transmission is very important in digital communication. However, in non-deterministic environment or different transmission message signal, bit error rate of PCM...
Liang-Bi Chen, Ing-Jer Huang, Yuan-Long Jeang
147
Voted
CGO
2006
IEEE
15 years 10 months ago
Constructing Virtual Architectures on a Tiled Processor
As the amount of available silicon resources on one chip increases, we have seen the advent of ever increasing parallel resources integrated on-chip. Many architectures use these ...
David Wentzlaff, Anant Agarwal
CSFW
2006
IEEE
15 years 10 months ago
Encoding Information Flow in Haskell
This paper presents an embedded security sublanguage for enforcing information-flow policies in the standard Haskell programming language. The sublanguage provides useful informa...
Peng Li, Steve Zdancewic