Sciweavers

849 search results - page 156 / 170
» Completely Non-malleable Schemes
Sort
View
ICRA
2008
IEEE
165views Robotics» more  ICRA 2008»
14 years 2 months ago
Comparison of robotic and clinical motor function improvement measures for sub-acute stroke patients
Abstract— In this paper, preliminary results in motor function improvement for four sub-acute stroke patients that underwent a hybrid robotic and traditional rehabilitation progr...
Ozkan Celik, Marcia Kilchenman O'Malley, Corwin Bo...
INFOCOM
2008
IEEE
14 years 2 months ago
On Reducing Mesh Delay for Peer-to-Peer Live Streaming
—Peer-to-peer (P2P) technology has emerged as a promising scalable solution for live streaming to large group. In this paper, we address the design of overlay which achieves low ...
Dongni Ren, Y.-T. Hillman Li, Shueng-Han Gary Chan
ISPASS
2008
IEEE
14 years 2 months ago
Program Phase Detection based on Critical Basic Block Transitions
Many programs go through phases as they execute. Knowing where these phases begin and end can be beneficial. For example, adaptive architectures can exploit such information to lo...
Paruj Ratanaworabhan, Martin Burtscher
LCN
2008
IEEE
14 years 2 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 2 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee