Sciweavers

1770 search results - page 186 / 354
» Writing requirements in computer security
Sort
View
ISM
2008
IEEE
155views Multimedia» more  ISM 2008»
13 years 10 months ago
Whiteboard Content Extraction and Analysis for the Classroom Environment
We describe whiteboard content capture system from Presentations Automatically Organized from Lectures (PAOL) that captures content within the setting of a classroom environment. ...
Paul E. Dickson, W. Richards Adrion, Allen R. Hans...
FCCM
2011
IEEE
331views VLSI» more  FCCM 2011»
13 years 2 months ago
Synthesis of Platform Architectures from OpenCL Programs
—The problem of automatically generating hardware modules from a high level representation of an application has been at the research forefront in the last few years. In this pap...
Muhsen Owaida, Nikolaos Bellas, Konstantis Dalouka...
FPL
2004
Springer
119views Hardware» more  FPL 2004»
14 years 2 months ago
Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
Sandeep S. Kumar, Christof Paar
IJISEC
2007
61views more  IJISEC 2007»
13 years 10 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
COMPUTER
2007
117views more  COMPUTER 2007»
13 years 10 months ago
Digital Technology and the Skills Shortage
ract in that they deal with sequences of sound or movement. Two social or personality skills can also be defined: Intrapersonal skill helps people perceive and control their own th...
W. Neville Holmes