Sciweavers

487 search results - page 11 / 98
» Integral Invariant Signatures
Sort
View
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
14 years 6 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
AVBPA
2003
Springer
235views Biometrics» more  AVBPA 2003»
14 years 3 months ago
Expression-Invariant 3D Face Recognition
We present a novel 3D face recognition approach based on geometric invariants introduced by Elad and Kimmel. The key idea of the proposed algorithm is a representation of the facia...
Alexander M. Bronstein, Michael M. Bronstein, Ron ...
CDC
2008
IEEE
14 years 4 months ago
Robust invariant set theory applied to networked buffer-level control
— A manufacturer producing several items keeps them into safety stocks (buffers) in order to supply an external stochastic demand without interruptions. We consider the classical...
Francesco Borrelli, Carmen Del Vecchio, Alessandra...
DATE
2007
IEEE
165views Hardware» more  DATE 2007»
14 years 4 months ago
Boosting the role of inductive invariants in model checking
This paper focuses on inductive invariants in unbounded model checking to improve efficiency and scalability. First of all, it introduces optimized techniques to speedup the comp...
Gianpiero Cabodi, Sergio Nocco, Stefano Quer
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
14 years 2 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng