Sciweavers

2388 search results - page 459 / 478
» Kernel information embeddings
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...
ICC
2008
IEEE
139views Communications» more  ICC 2008»
14 years 4 months ago
Communications and Sensing of Illumination Contributions in a Power LED Lighting System
— In recent years, LED technology emerged as a prime candidate for the future illumination light source, due to high energy efficiency and long life time. In addition, LEDs offe...
Jean-Paul M. G. Linnartz, Lorenzo Feri, Hongming Y...
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 4 months ago
Modular Integration Through Aspects: Making Cents of Legacy Systems
Recently, Continua Health Alliance has brought together a powerhouse team, including Cisco, IBM, Motorola and others, for personal telehealth products and services. This team will...
Celina Gibbs, Daniel Lohmann, Chunjian Robin Liu, ...
RTSS
2007
IEEE
14 years 4 months ago
ANDES: An ANalysis-Based DEsign Tool for Wireless Sensor Networks
— We have developed an analysis-based design tool, ANDES, for modeling a wireless sensor network system and analyzing its performance before deployment. ANDES enables designers t...
Vibha Prasad, Ting Yan, Praveen Jayachandran, Zeng...
IH
2007
Springer
14 years 3 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...