Sciweavers

17552 search results - page 3412 / 3511
» Signal-regulated systems and networks
Sort
View
CCS
2006
ACM
14 years 22 days ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
14 years 22 days ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
DFT
2006
IEEE
122views VLSI» more  DFT 2006»
14 years 22 days ago
Efficient and Robust Delay-Insensitive QCA (Quantum-Dot Cellular Automata) Design
The concept of clocking for QCA, referred to as the four-phase clocking, is widely used. However, inherited characteristics of QCA, such as the way to hold state, the way to synch...
Minsu Choi, Myungsu Choi, Zachary D. Patitz, Nohpi...
DSD
2006
IEEE
98views Hardware» more  DSD 2006»
14 years 22 days ago
Profiling Bluetooth and Linux on the Xilinx Virtex II Pro
In this paper, we present profiling results of the Bluetooth standard implemented on the Xilinx Virtex II Pro device. The investigation is performed in two stages. First, we solel...
Filipa Duarte, Stephan Wong
ECAI
2006
Springer
14 years 22 days ago
Learning Behaviors Models for Robot Execution Control
Robust execution of robotic tasks is a difficult problem. In many situations, these tasks involve complex behaviors combining different functionalities (e.g. perception, localizat...
Guillaume Infantes, Félix Ingrand, Malik Gh...
« Prev « First page 3412 / 3511 Last » Next »