Sciweavers

845 search results - page 131 / 169
» Reliable operating modes for distributed embedded systems
Sort
View
138
Voted
MOBISYS
2006
ACM
16 years 3 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
121
Voted
SAC
2005
ACM
15 years 9 months ago
Adaptive and fault tolerant medical vest for life-critical medical monitoring
In recent years, exciting technological advances have been made in development of flexible electronics. These technologies offer the opportunity to weave computation, communicat...
Roozbeh Jafari, Foad Dabiri, Philip Brisk, Majid S...
118
Voted
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
16 years 14 days ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
SAC
2008
ACM
15 years 3 months ago
A service architecture for sensor data provisioning for context-aware mobile applications
One of the main issues that inhibit the development of contextaware mobile applications is the lack of systematic methods for sensor data acquisition. This lack, however, is a res...
Bernardo Gonçalves, José Gonç...
RTAS
2005
IEEE
15 years 9 months ago
Out-of-Norm Assertions
Abstract— The increasing use of electronics in transport systems, such as the automotive and avionic domain, has lead to dramatic improvements with respect to functionality, safe...
Philipp Peti, Roman Obermaisser, Hermann Kopetz