Sciweavers

10146 search results - page 1856 / 2030
» Fast FAST
Sort
View
CAISE
2004
Springer
15 years 7 months ago
An Approach to the Enterprise Integration
This paper describes the evolution and the results of the research work carried out by the IRIS group in the field of enterprise integration. This research work began with the ARD...
Ricardo Chalmeta, Reyes Grangel, Cristina Campos, ...
CCS
2004
ACM
15 years 7 months ago
Privacy and security in library RFID: issues, practices, and architectures
We expose privacy issues related to Radio Frequency Identification (RFID) in libraries, describe current deployments, and suggest novel architectures for library RFID. Libraries ...
David Molnar, David Wagner
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
15 years 7 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
EMSOFT
2004
Springer
15 years 7 months ago
Remote customization of systems code for embedded devices
Dedicated operating systems for embedded systems are fast being phased out due to their use of manual optimization, which provides high performance and small footprint, but also r...
Sapan Bhatia, Charles Consel, Calton Pu
EWCBR
2004
Springer
15 years 7 months ago
Fault Diagnosis of Industrial Robots Using Acoustic Signals and Case-Based Reasoning
In industrial manufacturing rigorous testing is used to ensure that the delivered products meet their specifications. Mechanical maladjustment or faults often show their presence t...
Erik Olsson, Peter J. Funk, Marcus Bengtsson
« Prev « First page 1856 / 2030 Last » Next »