Sciweavers

872 search results - page 75 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
JCS
1998
338views more  JCS 1998»
13 years 7 months ago
Intrusion Detection Using Sequences of System Calls
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...
CORR
2008
Springer
65views Education» more  CORR 2008»
13 years 7 months ago
Solving functional reliability issue for an optical electrostatic switch
In this paper, we report the advantage of using AC actuating signal for driving MEMS actuators instead of DC voltages. The study is based upon micro mirror devices used in digital...
Henri Camon, C. Ganibal, N. Rapahoz, M. Trzmiel, C...
ISLPED
2010
ACM
234views Hardware» more  ISLPED 2010»
13 years 5 months ago
Diet SODA: a power-efficient processor for digital cameras
Power has become the most critical design constraint for embedded handheld devices. This paper proposes a power-efficient SIMD architecture, referred to as Diet SODA, for DSP appl...
Sangwon Seo, Ronald G. Dreslinski, Mark Woh, Chait...
GECCO
2011
Springer
247views Optimization» more  GECCO 2011»
12 years 11 months ago
An agent-based model of the effects of a primate social structure on the speed of natural selection
The rate of speciation is in most mammals an order of magnitude faster than in most other vertebrates. It is faster still in the social mammals. The apparent association between c...
Gideon M. Gluckman, Joanna Bryson
IACR
2011
88views more  IACR 2011»
12 years 7 months ago
GCM, GHASH and Weak Keys
The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single-pass authenticated encryption. The GHASH authentication component of GCM belongs to a cla...
Markku-Juhani O. Saarinen