Sciweavers

3955 search results - page 614 / 791
» Comparing the Power of Robots
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 2 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
CIARP
2005
Springer
14 years 2 months ago
Surface Grading Using Soft Colour-Texture Descriptors
Abstract. This paper presents a new approach to the question of surface grading based on soft colour-texture descriptors and well known classifiers. These descriptors come from gl...
Fernando López, José Miguel Valiente...
DCOSS
2005
Springer
14 years 2 months ago
TARA: Thermal-Aware Routing Algorithm for Implanted Sensor Networks
Implanted biological sensors are a special class of wireless sensor networks that are used in-vivo for various medical applications. One of the major challenges of continuous in-vi...
Qinghui Tang, Naveen Tummala, Sandeep K. S. Gupta,...
ER
2005
Springer
137views Database» more  ER 2005»
14 years 2 months ago
An Approach to Broaden the Semantic Coverage of ACL Speech Acts
Current speech-act based ACLs specify domain-independent information about communication and relegate domain-dependent information to an unspecified content language. This is reas...
Hong Jiang, Michael N. Huhns
FPL
2005
Springer
137views Hardware» more  FPL 2005»
14 years 2 months ago
Bitwise Optimised CAM for Network Intrusion Detection Systems
String pattern matching is a computationally expensive task, and when implemented in hardware, it can consume a large amount of resources for processing and storage. This paper pr...
Sherif Yusuf, Wayne Luk