Sciweavers

3482 search results - page 611 / 697
» Designing for security
Sort
View
CSMR
2006
IEEE
14 years 4 months ago
A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations
Software-intensive systems evolve continuously under the pressure of new and changing requirements, generally leading to an increase in overall system complexity. In this respect,...
Igor Ivkovic, Kostas Kontogiannis
HAPTICS
2006
IEEE
14 years 4 months ago
Haptic-Based Biometrics: A Feasibility Study
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Sh...
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...
IRI
2006
IEEE
14 years 4 months ago
Rapid systems of systems integration - combining an architecture-centric approach with enterprise service bus infrastructure
Rapid, yet methodical, systems of systems integration is in high demand. Application areas such as homeland security and disaster response add to the challenge because of a unique...
Ingolf Krüger, Michael Meisinger, Massimilian...
ISCAS
2006
IEEE
108views Hardware» more  ISCAS 2006»
14 years 4 months ago
An optimal normal basis elliptic curve cryptoprocessor for inductive RFID application
In this paper a 173-bit type II ONB ECC processor Section II introduces the mathematical backgrounds for for inductive RFID applications is described. Compared with curve operation...
Pak-Keung Leung, Oliver Chiu-sing Choy, Cheong-fat...