Sciweavers

2072 search results - page 191 / 415
» Applications of Independent Component Analysis
Sort
View
JCS
2010
80views more  JCS 2010»
13 years 5 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
ICNS
2009
IEEE
14 years 5 months ago
SIP-Based IMS Registration Analysis for WiMax-3G Interworking Architectures
The 3rd generation partnership project (3GPP) and 3GPP2 have standardized the IP multimedia subsystem (IMS) to provide ubiquitous and access network independent IP-based services ...
Arslan Munir, Ann Gordon-Ross
ISWC
2005
IEEE
14 years 4 months ago
Using Ultrasonic Hand Tracking to Augment Motion Analysis Based Recognition of Manipulative Gestures
The paper demonstrates how ultrasonic hand tracking can be used to improve the performance of a wearable, accelerometer and gyroscope based activity recognition system. Specifica...
Georg Ogris, Thomas Stiefmeier, Holger Junker, Pau...
CHES
2007
Springer
118views Cryptology» more  CHES 2007»
14 years 2 months ago
AES Encryption Implementation and Analysis on Commodity Graphics Processing Units
Graphics Processing Units (GPUs) present large potential performance gains within stream processing applications over the standard CPU. These performance gains are best realised wh...
Owen Harrison, John Waldron
FDL
2004
IEEE
14 years 2 months ago
UML System-Level Analysis and Design of Secure Communication Schemes for Embedded Systems
In this work we develop a secure communication protocol in the context of a Remote Meter Reading (RMR) System. We first analyze existing standards in secure communication (e.g. IP...
Mauro Prevostini, Giuseppe Piscopo, I. Stefanini