Sciweavers

2945 search results - page 535 / 589
» Designing and Implementing Malicious Hardware
Sort
View
JMS
2008
83views more  JMS 2008»
15 years 4 months ago
Monitoring of Physiological Parameters from Multiple Patients Using Wireless Sensor Network
This paper presents a wireless sensor network system that has the capability to monitor physiological parameters from multiple patient bodies. The system uses the Medical Implant C...
Mehmet R. Yuce, Peng Choong Ng, Jamil Y. Khan
INTEGRATION
2007
98views more  INTEGRATION 2007»
15 years 4 months ago
Hashchip: A shared-resource multi-hash function processor architecture on FPGA
The ubiquitous presence of mobile devices and the demand for better performance and efficiency have motivated research into embedded implementations of cryptography algorithms. I...
T. S. Ganesh, Michael T. Frederick, T. S. B. Sudar...
AUTOMATICA
2005
178views more  AUTOMATICA 2005»
15 years 4 months ago
Spacecraft attitude control using explicit model predictive control
In this paper, an explicit model predictive controller for the attitude of a satellite is designed. Explicit solutions to constrained linear MPC problems can be computed by solvin...
Øyvind Hegrenæs, Jan Tommy Gravdahl, ...
TII
2008
132views more  TII 2008»
15 years 4 months ago
Credential Management for Automatic Identification Solutions in Supply Chain Management
Current systems for automatic identification of goods presume a single administrative domain. However, in supply chain management systems temporary cooperations of multiple compani...
Marcel Henseler, Michael Rossberg, Guenter Schaefe...
CN
1999
156views more  CN 1999»
15 years 4 months ago
Virtual reality movies-real-time streaming of 3D objects
Powerful servers for computation and storage, high-speed networking resources, and high-performance 3D graphics workstation, which are typically available in scientific research e...
Stephan Olbrich, Helmut Pralle