Sciweavers

991 search results - page 45 / 199
» Foundations for Designing Secure Architectures
Sort
View
CODES
2005
IEEE
15 years 10 months ago
An architectural level design methodology for embedded face detection
Face detection and recognition research has attracted great attention in recent years. Automatic face detection has great potential in a large array of application areas, includin...
Vida Kianzad, Sankalita Saha, Jason Schlessman, Ga...
ECAI
2010
Springer
15 years 5 months ago
ABA: Argumentation Based Agents
Abstract. Many works have identified the potential benefits of using argumentation to address a large variety of multiagent problems. In this paper we take this idea one step furth...
Antonis C. Kakas, Leila Amgoud, Gabriele Kern-Isbe...
IPPS
2002
IEEE
15 years 9 months ago
Research and Design of a Middleware for Supporting Wide-Area Distributed Applications
As the platform for wide-area distributed applications, the middleware architecture should support adaptability, scalability, mobility, reliability and security. However, current ...
Dong Zhao, Shaowen Yao, Mingtian Zhou
PET
2010
Springer
15 years 8 months ago
Drac: An Architecture for Anonymous Low-Volume Communications
We present Drac, a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary. The...
George Danezis, Claudia Díaz, Carmela Tronc...
DSD
2005
IEEE
104views Hardware» more  DSD 2005»
15 years 10 months ago
Design of Transport Triggered Architecture Processors for Wireless Encryption
Transport Triggered Architecture (TTA) offers a costeffective trade-off between the size and performance of ASICs and the programmability of general-purpose processors. In this pa...
Panu Hämäläinen, Jari Heikkinen, Ma...