Sciweavers

5838 search results - page 1160 / 1168
» A File System for System Programming in Ubiquitous Computing
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 1 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
ICIP
2003
IEEE
14 years 1 months ago
Inter-camera color calibration by correlation model function
We present a novel solution to the inter-camera color calibration problem, which is very important for multi-camera systems. We propose a distance metric and a model function to e...
Fatih Murat Porikli
WPES
2003
ACM
14 years 1 months ago
Secure and private sequence comparisons
We give an efficient protocol for sequence comparisons of the edit-distance kind, such that neither party reveals anything about their private sequence to the other party (other t...
Mikhail J. Atallah, Florian Kerschbaum, Wenliang D...
ERSHOV
2003
Springer
14 years 1 months ago
Data Mappings in the Model-View-Controller Pattern
The model-view-controller pattern is used to keep a data model and its views consistent. Usually there is a one-to-one correspondence between the data in the model and its represen...
Martin Rammerstorfer, Hanspeter Mössenbö...
INFOCOM
2000
IEEE
14 years 27 days ago
Energy Conserving Routing in Wireless Ad-hoc Networks
— An ad-hoc network of wireless static nodes is considered as it arises in a rapidly deployed, sensor based, monitoring system. Information is generated in certain nodes and need...
Jae-Hwan Chang, Leandros Tassiulas
« Prev « First page 1160 / 1168 Last » Next »