Sciweavers

220 search results - page 6 / 44
» Physical face cloning
Sort
View
FOSAD
2004
Springer
14 years 1 months ago
A Tutorial on Physical Security and Side-Channel Attacks
Abstract. A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running ti...
François Koeune, François-Xavier Sta...
SEKE
2007
Springer
14 years 2 months ago
Managing XML Versions and Replicas in a P2P Context
Peer-to-Peer (P2P) systems seek to provide sharing of computational resources, which may be duplicated or versioned over several peers. Duplicate resources (i.e. replicas) are the...
Deise de Brum Saccol, Nina Edelweiss, Renata de Ma...
CCECE
2006
IEEE
14 years 1 months ago
XPHEVE: An Extensible Physics Engine for Virtual Environments
Virtual Reality (VR) has gained more popularity in the recent years due to the advancements in hardware technology, an advancement that eliminated much of the limitations that VR ...
Saeid Nourian, Xiaojun Shen, Nicolas D. Georganas
PERCOM
2010
ACM
13 years 6 months ago
Communication architectures and experiences for web-connected physical Smart objects
—We are witnessing a tremendous hype on the Internet of Things paradigm, with not only research projects, but also commercial products claiming to implement its fundamental mecha...
Juan Ignacio Vázquez, Jonathan Ruiz de Gari...
JSW
2007
165views more  JSW 2007»
13 years 7 months ago
In and out of Reality: Janus-Faced Location Awareness in Ubiquitous Games
— Many future ubiquitous devices will be able to determine their precise physical position using different types of localization techniques (e.g. GPS antennas for outdoor-, RFID ...
Alexander Höhfeld