Sciweavers

1818 search results - page 310 / 364
» Granularity-Adaptive Proof Presentation
Sort
View
DSN
2009
IEEE
14 years 3 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
ASIACRYPT
2009
Springer
14 years 3 months ago
Improved Cryptanalysis of Skein
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is arguably a serious candidate for selection as SHA-3. This paper presents the firs...
Jean-Philippe Aumasson, Çagdas Çalik...
UIST
2009
ACM
14 years 3 months ago
Abracadabra: wireless, high-precision, and unpowered finger input for very small mobile devices
We present Abracadabra, a magnetically driven input technique that offers users wireless, unpowered, high fidelity finger input for mobile devices with very small screens. By exte...
Chris Harrison, Scott E. Hudson
COMSWARE
2007
IEEE
14 years 3 months ago
Distributed Fault-Tolerant Topology Control in Static and Mobile Wireless Sensor Networks
— In wireless sensor networks, minimizing power consumption and at the same time maintaining desired properties in the network topology is of prime importance. In this work, we p...
Indranil Saha, Lokesh Kumar Sambasivan, Ranjeet Ku...
IPCCC
2007
IEEE
14 years 3 months ago
O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor Networks
In this paper, we study the Maximum lifetime Target Coverage problem (MTC), which is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. ...
My T. Thai, Yingshu Li, Feng Wang 0002