Sciweavers

631 search results - page 108 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
ESTIMEDIA
2006
Springer
13 years 11 months ago
Design of a WCET-Aware C Compiler
This paper presents techniques to tightly integrate worstcase execution time (WCET) information into a compiler framework. Currently, a tight integration of WCET information into ...
Heiko Falk, Paul Lokuciejewski, Henrik Theiling
MUM
2004
ACM
170views Multimedia» more  MUM 2004»
14 years 1 months ago
Multiple embedding using robust watermarks for wireless medical images
Within the expanding paradigm of medical imaging and wireless communications there is increasing demand for transmitting diagnostic medical imagery over error-prone wireless commu...
Dominic Osborne, Derek Abbott, Matthew Sorell, Der...
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
14 years 1 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
ASPDAC
2008
ACM
127views Hardware» more  ASPDAC 2008»
13 years 9 months ago
Power grid analysis benchmarks
ACT Benchmarks are an immensely useful tool in performing research since they allow for rapid and clear comparison between different approaches to solving CAD problems. Recent expe...
Sani R. Nassif
BMCBI
2007
149views more  BMCBI 2007»
13 years 7 months ago
Novel and simple transformation algorithm for combining microarray data sets
Background: With microarray technology, variability in experimental environments such as RNA sources, microarray production, or the use of different platforms, can cause bias. Suc...
Ki-Yeol Kim, Dong Hyuk Ki, Ha Jin Jeong, Hei-Cheul...