Sciweavers

2409 search results - page 405 / 482
» Building Components from Functions
Sort
View
IJOE
2008
120views more  IJOE 2008»
13 years 10 months ago
Application of the Control Validation to the D.E.S. Teaching
Objectives of Automation courses are knowledge and know-how transfer to students. It is important for learner to control locally or remotely real systems composed of many sensors a...
Pascale Marange, François Gellot, Bernard R...
IJISEC
2006
106views more  IJISEC 2006»
13 years 10 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
JBI
2008
13 years 10 months ago
The Field Representation Language
The complexity of quantitative biomedical models, and the rate at which they are published, is increasing to a point where managing the information has become all but impossible w...
Guy Tsafnat
TC
2008
13 years 10 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
TIP
2008
128views more  TIP 2008»
13 years 10 months ago
The Pairing of a Wavelet Basis With a Mildly Redundant Analysis via Subband Regression
A distinction is usually made between wavelet bases and wavelet frames. The former are associated with a one-to-one representation of signals, which is somewhat constrained but mos...
Michael Unser, Dimitri Van De Ville