Sciweavers

575 search results - page 79 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
NBIS
2009
Springer
14 years 2 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
IEEEPACT
2006
IEEE
14 years 1 months ago
Testing implementations of transactional memory
Transactional memory is an attractive design concept for scalable multiprocessors because it offers efficient lock-free synchronization and greatly simplifies parallel software....
Chaiyasit Manovit, Sudheendra Hangal, Hassan Chafi...
DAC
2006
ACM
14 years 1 months ago
Visibility enhancement for silicon debug
Several emerging Design-for-Debug (DFD) methodologies are addressing silicon debug by making internal signal values and other data observable. Most of these methodologies require ...
Yu-Chin Hsu, Fur-Shing Tsai, Wells Jong, Ying-Tsai...
CODES
2006
IEEE
14 years 1 months ago
Fuzzy decision making in embedded system design
The use of Application Specific Instruction-set Processors (ASIP) is a solution to the problem of increasing complexity in embedded systems design. One of the major challenges in...
Alessandro G. Di Nuovo, Maurizio Palesi, Davide Pa...
CVPR
2000
IEEE
14 years 9 months ago
Statistical Modeling and Performance Characterization of a Real-Time Dual Camera Surveillance System
The engineering of computer vision systems that meet application speci c computational and accuracy requirements is crucial to the deployment of real-life computer vision systems....
Michael Greiffenhagen, Visvanathan Ramesh, Dorin C...