Sciweavers

1116 search results - page 95 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
JMM2
2006
133views more  JMM2 2006»
13 years 8 months ago
An Adaptive Method for Image Recovery in the DFT Domain
In image authentication research, a common approach is to divide a given image into a number of smaller blocks, and embed a fragile watermark into each block. The modifications can...
Peining Tao, Ahmet M. Eskicioglu
ICCAD
2006
IEEE
147views Hardware» more  ICCAD 2006»
14 years 4 months ago
Analysis and modeling of CD variation for statistical static timing
Statistical static timing analysis (SSTA) has become a key method for analyzing the effect of process variation in aggressively scaled CMOS technologies. Much research has focused...
Brian Cline, Kaviraj Chopra, David Blaauw, Yu Cao
SCP
2010
155views more  SCP 2010»
13 years 6 months ago
Type inference and strong static type checking for Promela
The SPIN model checker and its specification language Promela have been used extensively in industry and academia to check logical properties of distributed algorithms and protoc...
Alastair F. Donaldson, Simon J. Gay
MOBISYS
2006
ACM
14 years 7 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
ICSOC
2007
Springer
14 years 2 months ago
Dynamic Service Provisioning Using GRIA SLAs
Service Level Agreements (SLA) include quality of service (QoS) constraints and bounds that have to be honoured by the service provider. To maximise the Service Provider revenue wh...
Mike J. Boniface, Stephen C. Phillips, Alfonso S&a...