Sciweavers

378 search results - page 62 / 76
» A framework for interactive analysis of timing constraints i...
Sort
View
ETS
2007
IEEE
128views Hardware» more  ETS 2007»
13 years 9 months ago
Selecting Power-Optimal SBST Routines for On-Line Processor Testing
Software-Based Self-Test (SBST) has emerged as an effective strategy for on-line testing of processors integrated in non-safety critical embedded system applications. Among the mo...
Andreas Merentitis, Nektarios Kranitis, Antonis M....
IJKL
2008
64views more  IJKL 2008»
13 years 7 months ago
Satellite-enabled educational services specification and requirements analysis based on user feedback
: Advanced tele-education services provision in remote geographically dispersed user communities (such as agriculture and maritime), based on the specific needs and requirements of...
Sofia Tsekeridou, Thanassis Tiropanis, Dimitris Ro...
AFRICACRYPT
2010
Springer
14 years 1 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
SENSYS
2006
ACM
14 years 1 months ago
StarDust: a flexible architecture for passive localization in wireless sensor networks
The problem of localization in wireless sensor networks where nodes do not use ranging hardware, remains a challenging problem, when considering the required location accuracy, en...
Radu Stoleru, Pascal Vicaire, Tian He, John A. Sta...
PETRA
2009
ACM
14 years 1 months ago
Towards faster activity search using embedding-based subsequence matching
Event search is the problem of identifying events or activity of interest in a large database storing long sequences of activity. In this paper, our topic is the problem of identi...
Panagiotis Papapetrou, Paul Doliotis, Vassilis Ath...