Sciweavers

385 search results - page 36 / 77
» Problem Frames and Architectures for Security Problems
Sort
View
CARDIS
2008
Springer
153views Hardware» more  CARDIS 2008»
13 years 11 months ago
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents
In recent years more and more security sensitive applications use passive smart devices such as contactless smart cards and RFID tags. Cost constraints imply a small hardware footp...
Carsten Rolfes, Axel Poschmann, Gregor Leander, Ch...
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
13 years 4 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...
AAAI
2007
13 years 12 months ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl
GECCO
2008
Springer
114views Optimization» more  GECCO 2008»
13 years 10 months ago
Strategic positioning in tactical scenario planning
Capability planning problems are pervasive throughout many areas of human interest with prominent examples found in defense and security. Planning provides a unique context for op...
James M. Whitacre, Hussein A. Abbass, Ruhul A. Sar...
IVEVA
2004
13 years 11 months ago
Giving Embodied Agents a Grid-Boost
Grid technology has been widely used for large-scale computational problems, but it also provides a framework for running a big number of smallsized processes. Moreover, these proc...
José A. Pérez, Carlos Delgado-Mata, ...