Sciweavers

763 search results - page 89 / 153
» Digital Signatures Today
Sort
View
MTDT
2003
IEEE
164views Hardware» more  MTDT 2003»
14 years 2 months ago
Applying Defect-Based Test to Embedded Memories in a COT Model
ct Defect-based testing for digital logic concentrates primarily on methods of test application, including for example at-speed structural tests and IDDQ testing. In contrast, defe...
Robert C. Aitken
CCS
2005
ACM
14 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
GCC
2003
Springer
14 years 2 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
MOBICOM
2010
ACM
13 years 9 months ago
CSMA/CN: carrier sense multiple access with collision notification
A wireless transmitter learns of a packet loss, infers collision, only after completing the entire transmission. If the transmitter could detect the collision early (such as with ...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...
ICPR
2006
IEEE
14 years 10 months ago
Texture Image Retrieval Using Novel Non-separable Filter Banks Based on Centrally Symmetric Matrices
Though millions of images are stored in a large digital image library today, the user can not access or make full use of these image information unless the digital image library i...
Patrick Shen-Pei Wang, Xinge You, Yuan Yan Tang, Y...