Sciweavers

2945 search results - page 50 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ACIVS
2005
Springer
15 years 9 months ago
FPGA Design and Implementation of a Wavelet-Domain Video Denoising System
Multiresolution video denoising is becoming an increasingly popular research topic over recent years. Although several wavelet based algorithms reportedly outperform classical sing...
Mihajlo Katona, Aleksandra Pizurica, Nikola Teslic...
ISER
2000
Springer
88views Robotics» more  ISER 2000»
15 years 7 months ago
Design, Implementation, and Remote Operation of the Humanoid H6
Abstract: The paper describes the humanoid robot \H6", which was designed to serve as a platform for experimental research on the development of advanced humanoid-type robots....
Satoshi Kagami, Koichi Nishiwaki, James J. Kuffner...

Publication
117views
15 years 7 days ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
15 years 9 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
132
Voted
INFOCOM
2000
IEEE
15 years 8 months ago
Design, Implementation and Performance of a Content-Based Switch
Abstract— In this paper, we share our experience in designing and building a content based switch which we call L5. In addition to the layer 2-3-4 information available in the pa...
George Apostolopoulos, David Aubespin, Vinod G. J....