Sciweavers

1477 search results - page 196 / 296
» Criteria for the evaluation of implemented architectures
Sort
View
DAC
2009
ACM
13 years 6 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
HCI
2009
13 years 6 months ago
UbiGesture: Customizing and Profiling Hand Gestures in Ubiquitous Environment
Abstract. One of the main challenges of interaction in a ubiquitous environment is the use of hand gestures for interacting with day to day applications. This interaction may be ne...
Ayman Atia, Shin Takahashi, Kazuo Misue, Jiro Tana...
TDP
2010
189views more  TDP 2010»
13 years 3 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
FAST
2011
13 years 14 days ago
Reliably Erasing Data from Flash-Based Solid State Drives
Reliably erasing data from storage media (sanitizing the media) is a critical component of secure data management. While sanitizing entire disks and individual files is well-unde...
Michael Yung Chung Wei, Laura M. Grupp, Frederick ...
SAC
2011
ACM
12 years 11 months ago
I4Copter: an adaptable and modular quadrotor platform
Quadrotor helicopters are micro air vehicles with vertical take-off and landing capabilities controlled by varying the rotation speed of four fixed pitch propellers. Due to their...
Peter Ulbrich, Rüdiger Kapitza, Christian Har...