Sciweavers

6955 search results - page 1214 / 1391
» Mobile Recommender Systems
Sort
View
123
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
139
Voted
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
15 years 1 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
170
Voted
ISLPED
2010
ACM
128views Hardware» more  ISLPED 2010»
15 years 1 months ago
Rank-aware cache replacement and write buffering to improve DRAM energy efficiency
DRAM power and energy efficiency considerations are becoming increasingly important for low-power and mobile systems. Using lower power modes provided by commodity DRAM chips redu...
Ahmed M. Amin, Zeshan Chishti
140
Voted
PIMRC
2010
IEEE
15 years 1 months ago
Cognitive Beacon Channel via GSM and UMTS
This paper proposes the utilization of GSM logical channels (RACH, AGCH and TCH) and UMTS signaling (MIB and SIBs) of the Broadcast Channel to transmit a Cognitive Beacon Channel (...
Rodrigo Soule de Castro, Philippe Godlewski, Phili...
143
Voted
ICRA
2009
IEEE
117views Robotics» more  ICRA 2009»
15 years 1 months ago
Temporal stabilization of discrete movement in variable environments: An attractor dynamics approach
The ability to generate discrete movement with distinct and stable time courses is important for interaction scenarios both between different robots and with human partners, for ca...
Matthias Tuma, Ioannis Iossifidis, Gregor Schö...
« Prev « First page 1214 / 1391 Last » Next »