Sciweavers

1177 search results - page 221 / 236
» Integrating Security Administration into Software Architectu...
Sort
View
MVA
1992
188views Computer Vision» more  MVA 1992»
13 years 8 months ago
The Programmable and Configurable Low Level Vision Unit of the HERMIA Machine
In this work the Low Level Vision Unit (LLVU) of the Heterogeneous and Reconfigurable Machine for Image Analysis (HERMIA) is described. The LLVU consists of the innovative integra...
Gaetano Gerardi, Giancarlo Parodi
SIGCOMM
2009
ACM
14 years 2 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
WPES
2005
ACM
14 years 1 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
NAR
2007
145views more  NAR 2007»
13 years 7 months ago
Primer3Plus, an enhanced web interface to Primer3
Here we present Primer3Plus, a new web interface to the popular Primer3 primer design program as an enhanced alternative for the CGI- scripts that come with Primer3. Primer3 consi...
Andreas Untergasser, Harm Nijveen, Xiangyu Rao, To...
DAC
2009
ACM
14 years 8 months ago
Analysis and mitigation of process variation impacts on Power-Attack Tolerance
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impac...
Lang Lin, Wayne P. Burleson