Sciweavers

643 search results - page 84 / 129
» Modelling and Using Sensed Context Information in the Design...
Sort
View
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
13 years 9 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
ISPW
2009
IEEE
14 years 3 months ago
A Pattern for Modeling Rework in Software Development Processes
It is usual for work completed at one point in a software development process to be revisited, or reworked, at a later point. Such rework is informally understood, but if we hope t...
Aaron G. Cass, Leon J. Osterweil, Alexander E. Wis...
WWW
2008
ACM
14 years 9 months ago
SMash: secure component model for cross-domain mashups on unmodified browsers
Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user ...
Frederik De Keukelaere, Sumeer Bhola, Michael Stei...
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
13 years 9 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
MHCI
2009
Springer
14 years 1 months ago
Minimizing mobile phone disruption via smart profile management
In this paper, we describe the Smart Profile Management application that was designed to help minimize mobile phone disruptions. The system does this by making phone profile chang...
Amnon Dekel, Dan Nacht, Scott Kirkpatrick