Sciweavers

563 search results - page 96 / 113
» Reconfigurable trusted computing in hardware
Sort
View
AISC
1998
Springer
13 years 11 months ago
Reasoning About Coding Theory: The Benefits We Get from Computer Algebra
The use of computer algebra is usually considered beneficial for mechanised reasoning in mathematical domains. We present a case study, in the application domain of coding theory, ...
Clemens Ballarin, Lawrence C. Paulson
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
CHI
2004
ACM
14 years 7 months ago
Two-handed interaction on a tablet display
A touchscreen can be overlaid on a tablet computer to support asymmetric two-handed interaction in which the non-preferred hand operates the touchscreen and the preferred hand use...
Ka-Ping Yee
ICDCS
2008
IEEE
14 years 1 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
FPGA
2004
ACM
137views FPGA» more  FPGA 2004»
14 years 26 days ago
Making visible the thermal behaviour of embedded microprocessors on FPGAs: a progress report
This paper shows a method to verifying the thermal status of complex FPGA-based circuits like microprocessors. Thus, the designer can evaluate if a particular block is working bey...
Sergio López-Buedo, Eduardo I. Boemo