Sciweavers

2178 search results - page 267 / 436
» Toward Systemically Secure IT Architectures
Sort
View
ESANN
2007
15 years 4 months ago
A neural model of cross-modal association in insects
Abstract. We developed a computational model of learning in the Mushroom Body, a region of multimodal integration in the insect brain. Using realistic neural dynamics and a biologi...
Jan Wessnitzer, Barbara Webb
118
Voted
LREC
2008
138views Education» more  LREC 2008»
15 years 4 months ago
Language Resources for Semantic Document Annotation and Crosslingual Retrieval
This paper describes the interaction among language resources for an adequate concept annotation of domain texts in several languages. The architecture includes domain ontology, d...
Petya Osenova, Kiril Ivanov Simov, Eelco Mossel
CCS
2010
ACM
15 years 5 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
109
Voted
SAFECOMP
2007
Springer
15 years 9 months ago
A Comparison of Partitioning Operating Systems for Integrated Systems
In present-day electronic systems, application subsystems from different vendors and with different criticality levels are integrated within the same hardware. Hence, encapsulati...
Bernhard Leiner, Martin Schlager, Roman Obermaisse...
DAC
2005
ACM
16 years 4 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...