Sciweavers

2178 search results - page 267 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ESANN
2007
13 years 11 months ago
A neural model of cross-modal association in insects
Abstract. We developed a computational model of learning in the Mushroom Body, a region of multimodal integration in the insect brain. Using realistic neural dynamics and a biologi...
Jan Wessnitzer, Barbara Webb
LREC
2008
138views Education» more  LREC 2008»
13 years 11 months ago
Language Resources for Semantic Document Annotation and Crosslingual Retrieval
This paper describes the interaction among language resources for an adequate concept annotation of domain texts in several languages. The architecture includes domain ontology, d...
Petya Osenova, Kiril Ivanov Simov, Eelco Mossel
CCS
2010
ACM
13 years 6 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
SAFECOMP
2007
Springer
14 years 3 months ago
A Comparison of Partitioning Operating Systems for Integrated Systems
In present-day electronic systems, application subsystems from different vendors and with different criticality levels are integrated within the same hardware. Hence, encapsulati...
Bernhard Leiner, Martin Schlager, Roman Obermaisse...
DAC
2005
ACM
14 years 10 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...