Sciweavers

10301 search results - page 2001 / 2061
» informs 2007
Sort
View
122
Voted
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 10 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
132
Voted
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
15 years 10 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
139
Voted
TPHOL
2007
IEEE
15 years 10 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao
141
Voted
VTC
2007
IEEE
105views Communications» more  VTC 2007»
15 years 10 months ago
Random Beamforming OFDMA for Future Generation Cellular Communication Systems
—This paper presents a downlink performance analysis of a Layered Random Beamforming (LRB) - MIMO-OFDMA Physical Layer (PHY) as applicable to future generation wireless communica...
Congzheng Han, Angela Doufexi, Simon Armour, Joe M...
137
Voted
ACIVS
2007
Springer
15 years 9 months ago
A Multi-touch Surface Using Multiple Cameras
Abstract. In this project we present a framework for a multi-touch surface using multiple cameras. With an overhead camera and side-mounted camera we determine the three dimensiona...
Itai Katz, Kevin Gabayan, Hamid K. Aghajan
« Prev « First page 2001 / 2061 Last » Next »