Sciweavers

7853 search results - page 1538 / 1571
» Learning from Each Other
Sort
View
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
14 years 2 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
INFOCOM
2003
IEEE
14 years 1 months ago
Sensor-Centric Quality of Routing in Sensor Networks
Abstract— Standard embeded sensor nework models emphasize energy efficiency and distributed decision-making by considering untethered and unattended sensors. To this we add two ...
Rajgopal Kannan, Sudipta Sarangi, S. Sitharama Iye...
ITC
2003
IEEE
157views Hardware» more  ITC 2003»
14 years 1 months ago
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
Ramesh Karri, Grigori Kuznetsov, Michael Göss...
ICAIL
2003
ACM
14 years 1 months ago
Positive and Negative Expectations and the Deontic Nature of Social Conventions
The general goal of the paper is to show the normative/deontic nature of conventions. Conventions are traditionally defined as regularity of behavior based on expectations evolved...
Cristiano Castelfranchi, Luca Tummolini
FPGA
2003
ACM
156views FPGA» more  FPGA 2003»
14 years 1 months ago
Architectures and algorithms for synthesizable embedded programmable logic cores
As integrated circuits become more and more complex, the ability to make post-fabrication changes will become more and more attractive. This ability can be realized using programm...
Noha Kafafi, Kimberly Bozman, Steven J. E. Wilton
« Prev « First page 1538 / 1571 Last » Next »