Sciweavers

3095 search results - page 89 / 619
» Ubiquitous presence systems
Sort
View
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 15 days ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
ASPDAC
2001
ACM
105views Hardware» more  ASPDAC 2001»
14 years 15 days ago
Toward better wireload models in the presence of obstacles
Wirelength estimation techniques typically contain a site density function that enumerates all possible path sites for each wirelength in an architecture and an occupation probabil...
Chung-Kuan Cheng, Andrew B. Kahng, Bao Liu, Dirk S...
CORR
2006
Springer
85views Education» more  CORR 2006»
13 years 8 months ago
Discovering Network Topology in the Presence of Byzantine Faults
We pose and study the problem of Byzantine-robust topology discovery in an arbitrary asynchronous network. The problem straction of fault-tolerant routing. We formally state the we...
Mikhail Nesterenko, Sébastien Tixeuil
ICDE
1997
IEEE
101views Database» more  ICDE 1997»
14 years 10 months ago
Selectivity Estimation in the Presence of Alphanumeric Correlations
Query optimization is an integral part of relational database management systems. One important task in query optimization is selectivity estimation, that is, given a query P, we ...
Min Wang, Jeffrey Scott Vitter, Balakrishna R. Iye...
TABLETOP
2007
IEEE
14 years 3 months ago
T3: Rapid Prototyping of High-Resolution and Mixed-Presence Tabletop Applications
Multi-person tabletop applications that require a high display resolution, such as collaborative web-browsing, are currently very difficult to create. Tabletop systems that suppo...
Peter Robinson, Philip Tuddenham