Sciweavers

43 search results - page 5 / 9
» Object-Swapping for Resource-Constrained Devices
Sort
View
JNW
2008
99views more  JNW 2008»
13 years 7 months ago
Probabilistic Key Management Practical Concerns in Wireless Sensor Networks
The subject of Key Management in Wireless Sensor Networks has gained increased attention from the security community around the world in the last years. Several proposals were made...
Rui Miguel Soares Silva, Nuno Sidónio A. Pe...
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 5 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
SIGCSE
2012
ACM
284views Education» more  SIGCSE 2012»
12 years 3 months ago
Teaching operating systems using android
The computing landscape is shifting towards mobile devices. To learn about operating systems, it is increasingly important for students to gain hands-on kernel programming experie...
Jeremy Andrus, Jason Nieh
ICDCSW
2003
IEEE
14 years 1 months ago
A Connector-Aware Middleware for Distributed Deployment and Mobility
To address the need for highly configurable and customizable distributed systems, researchers and practitioners are investigating various innovative approaches. One of the promisi...
Marija Mikic-Rakic, Nenad Medvidovic
CGO
2004
IEEE
13 years 11 months ago
A Compiler Scheme for Reusing Intermediate Computation Results
Recent research has shown that programs often exhibit value locality. Such locality occurs when a code segment, although executed repeatedly in the program, takes only a small num...
Yonghua Ding, Zhiyuan Li