Sciweavers

2421 search results - page 339 / 485
» Message from the Co-Chairs
Sort
View
CHI
2004
ACM
14 years 9 months ago
Connecting with the absent presence: pervasive technology use and effects on community
This research investigates how the pervasive use of technology by an individual in the physical presence of group members affects community level. When technology use occurs, the ...
Lisa Kleinman
SIGMOD
2006
ACM
170views Database» more  SIGMOD 2006»
14 years 9 months ago
Energy-efficient monitoring of extreme values in sensor networks
Monitoring extreme values (MAX or MIN) is a fundamental problem in wireless sensor networks (and in general, complex dynamic systems). This problem presents very different algorit...
Adam Silberstein, Jun Yang 0001, Kamesh Munagala
DCC
2003
IEEE
14 years 9 months ago
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error? correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to e...
Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg
ICWS
2009
IEEE
14 years 6 months ago
Analysis of Signature Wrapping Attacks and Countermeasures
In recent research it turned out that Boolean verification of digital signatures in the context of WSSecurity is likely to fail: If parts of a SOAP message are signed and the sig...
Sebastian Gajek, Meiko Jensen, Lijun Liao, Jö...
ICCD
2008
IEEE
160views Hardware» more  ICCD 2008»
14 years 6 months ago
Fast arbiters for on-chip network switches
— The need for efficient implementation of simple crossbar schedulers has increased in the recent years due to the advent of on-chip interconnection networks that require low la...
Giorgos Dimitrakopoulos, Nikos Chrysos, Costas Gal...