Sciweavers

467 search results - page 67 / 94
» Using the DEVS Paradigm to Implement a Simulated Processor
Sort
View
EUROCRYPT
2007
Springer
14 years 21 days ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
IICS
2009
Springer
14 years 1 months ago
Bi-directional Distribution of eLearning Content for Cross-technology Learning Communities
: This article describes the use of a service-oriented architecture to bridge the gap between different eLearning types and tools. The basic concept is a bi-directional distributio...
Raphael Zender, Enrico Dressler, Ulrike Lucke, Dja...
MOBIHOC
2005
ACM
14 years 8 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
PATMOS
2007
Springer
14 years 2 months ago
Optimization for Real-Time Systems with Non-convex Power Versus Speed Models
Abstract. Until now, the great majority of research in low-power systems has assumed a convex power model. However, recently, due to the confluence of emerging technological and ar...
Ani Nahapetian, Foad Dabiri, Miodrag Potkonjak, Ma...
DFT
2004
IEEE
95views VLSI» more  DFT 2004»
14 years 16 days ago
Mixed Loopback BiST for RF Digital Transceivers
In this paper we analyze the performance of a mixed built-in-self-test (BiST) for RF IC digital transceivers, where a baseband processor can be used both as a test pattern generat...
Jerzy Dabrowski, Javier Gonzalez Bayon