Sciweavers

273 search results - page 49 / 55
» Constructions from Dots and Lines
Sort
View
HICSS
2010
IEEE
185views Biometrics» more  HICSS 2010»
14 years 2 months ago
Concurrent Architecture for Automated Malware Classification
This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
Timothy Daly, Luanne Burns
ASIACRYPT
2009
Springer
14 years 2 months ago
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Abstract. Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, calle...
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi,...
CSREAEEE
2006
145views Business» more  CSREAEEE 2006»
13 years 9 months ago
e-Business Systems: Exploring Knowledge Prospect Domains (KPDs)
Research was conducted in the area of sustainable knowledge extraction from e-business systems and technologies. Differentiating approaches from three notable authors in the field...
Daniel Botha
SSWMC
2004
13 years 9 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
CPHYSICS
2008
123views more  CPHYSICS 2008»
13 years 8 months ago
wannier90: A tool for obtaining maximally-localised Wannier functions
We present wannier90, a program for calculating maximally-localised Wannier functions (MLWF) from a set of Bloch energy bands that may or may not be attached to or mixed with othe...
Arash A. Mostofi, Jonathan R. Yates, Young-Su Lee,...