Sciweavers

314 search results - page 59 / 63
» Evaluation of Technologies for Business Process Automation
Sort
View
EIT
2008
IEEE
13 years 9 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 10 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
TVLSI
2010
13 years 2 months ago
A Low-Power DSP for Wireless Communications
This paper proposes a low-power high-throughput digital signal processor (DSP) for baseband processing in wireless terminals. It builds on our earlier architecture--Signal processi...
Hyunseok Lee, Chaitali Chakrabarti, Trevor N. Mudg...
CORR
2012
Springer
237views Education» more  CORR 2012»
12 years 3 months ago
Novel Component Based Development Model For Sip-Based Mobile Application
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...
SIGIR
2011
ACM
12 years 10 months ago
Picasso - to sing, you must close your eyes and draw
We study the problem of automatically assigning appropriate music pieces to a picture or, in general, series of pictures. This task, commonly referred to as soundtrack suggestion,...
Aleksandar Stupar, Sebastian Michel