Sciweavers

1723 search results - page 160 / 345
» Generalized file system dependencies
Sort
View
MSWIM
2006
ACM
15 years 10 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
NOSSDAV
2010
Springer
15 years 6 months ago
Wireless network interface energy conservation for bottlenecked first mile networks
Placeshifting systems stream videos from the home to a single remote user using the limited upstream capacity of the home broadband link. We analyze the behavior of two placeshift...
Surendar Chandra
CASES
2010
ACM
15 years 2 months ago
Improving the quality of ring oscillator PUFs on FPGAs
Physical Unclonable Functions (PUFs) based on Ring Oscillators (ROs) are a promising primitive for FPGA security. However, the quality of their implementation depends on several d...
Dominik Merli, Frederic Stumpf, Claudia Eckert
CASES
2010
ACM
15 years 1 months ago
Hardware trust implications of 3-D integration
3-D circuit-level integration is a chip fabrication technique in which two or more dies are stacked and combined into a single circuit through the use of vertical electroconductiv...
Ted Huffmire, Timothy E. Levin, Michael Bilzor, Cy...
ATAL
2011
Springer
14 years 4 months ago
Conviviality measures
Conviviality has been introduced as a social science concept for multiagent systems to highlight soft qualitative requirements like user friendliness of systems. In this paper we ...
Patrice Caire, Baptiste Alcalde, Leendert van der ...