Sciweavers

42 search results - page 8 / 9
» Experiments in attacking FPGA-based embedded systems using d...
Sort
View
BMCBI
2006
186views more  BMCBI 2006»
13 years 7 months ago
Systematic gene function prediction from gene expression data by using a fuzzy nearest-cluster method
Background: Quantitative simultaneous monitoring of the expression levels of thousands of genes under various experimental conditions is now possible using microarray experiments....
Xiaoli Li, Yin-Chet Tan, See-Kiong Ng
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
ITS
2010
Springer
148views Multimedia» more  ITS 2010»
14 years 8 days ago
Developing Empirically Based Student Personality Profiles for Affective Feedback Models
The impact of affect on learning has been the subject of increasing attention. Because of the differential effects of students’ affective states on learning outcomes, there is a ...
Jennifer L. Robison, Scott W. McQuiggan, James C. ...
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
13 years 7 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
CODES
2007
IEEE
14 years 1 months ago
Locality optimization in wireless applications
There is a strong need now for compilers of embedded systems to find effective ways of optimizing series of loop-nests, wherein majority of the memory references occur in the fo...
Javed Absar, Min Li, Praveen Raghavan, Andy Lambre...