Sciweavers

533 search results - page 74 / 107
» Control flow based obfuscation
Sort
View
JSAC
2006
152views more  JSAC 2006»
15 years 2 months ago
A Distributed End-to-End Reservation Protocol for IEEE 802.11-Based Wireless Mesh Networks
Abstract--This paper presents an end-to-end reservation protocol for quality-of-service (QoS) support in the medium access control layer of wireless multihop mesh networks. It rese...
E. Carlson, Christian Prehofer, Christian Bettstet...
177
Voted
JDCTA
2010
688views more  JDCTA 2010»
14 years 9 months ago
Hand Mouse: Real Time Hand Motion Detection System Based on Analysis of Finger Blobs
Hand detection is a fundamental step in many practical applications as gesture recognition, video surveillance, and multimodal machine interface and so on. The aim of this paper i...
Ibrahim Furkan Ince, Manuel Socarras-Garzon, Tae-C...
VLSID
2006
IEEE
71views VLSI» more  VLSID 2006»
15 years 8 months ago
Clockless Pipelining for Coarse Grain Datapaths
In this paper, we present two novel synchronization approaches to support data flow in clockless designs using single-rail encoding. Both approaches are based on self-resetting st...
Abdelhalim Alsharqawi, Abdel Ejnioui
FC
1998
Springer
83views Cryptology» more  FC 1998»
15 years 6 months ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval
CDC
2010
IEEE
109views Control Systems» more  CDC 2010»
14 years 9 months ago
Reproducing slugging oscillations of a real oil well
This paper addresses the problem of reproducing oscillations generated by the well-known slugging phenomenon in multiphase flow. Reported investigations show how to determine the p...
Florent Di Meglio, Glenn-Ole Kaasa, Nicolas Petit,...