Sciweavers

557 search results - page 15 / 112
» Two experiences designing for effective security
Sort
View
FGCN
2008
IEEE
197views Communications» more  FGCN 2008»
14 years 3 months ago
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories: protocols based on digital signature and protocols based on improv...
Xin Zhao, Xiaodong Wang
ECSCW
2001
13 years 10 months ago
The effects of network delays on group work in real-time groupware
Network delays are a fact of life when using real-time groupware over a wide area network such as the Internet. This paper looks at how network delays affect closelycoupled group w...
Carl Gutwin
HOST
2008
IEEE
14 years 3 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris
TE
2010
70views more  TE 2010»
13 years 3 months ago
A Cost-Effective Atomic Force Microscope for Undergraduate Control Laboratories
Abstract--This paper presents a simple, cost-effective and robust atomic force microscope (AFM), which has been purposely designed and built for use as a teaching aid in undergradu...
Colin N. Jones, Jorge Gonçalves
ISESE
2003
IEEE
14 years 1 months ago
An Experimental Evaluation of Inspection and Testing for Detection of Design Faults
The two most common strategies for verification and validation, inspection and testing, are in a controlled experiment evaluated in terms of their fault detection capabilities. Th...
Carina Andersson, Thomas Thelin, Per Runeson, Nina...