Sciweavers

2107 search results - page 384 / 422
» b 2007
Sort
View
CCS
2007
ACM
14 years 4 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
DCOSS
2007
Springer
14 years 4 months ago
Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networ
Abstract. We develop a practical, distributed algorithm to detect events, identify measurement errors, and infer missing readings in ecological applications of wireless sensor netw...
Luís M. A. Bettencourt, Aric A. Hagberg, Le...
ASPDAC
2007
ACM
108views Hardware» more  ASPDAC 2007»
14 years 1 months ago
Noise-Direct: A Technique for Power Supply Noise Aware Floorplanning Using Microarchitecture Profiling
This paper proposes Noise-Direct, a design methodology for power integrity aware floorplanning, using microarchitectural feedback to guide module placement. Stringent power constr...
Fayez Mohamood, Michael B. Healy, Sung Kyu Lim, Hs...
COMPGEOM
2007
ACM
14 years 1 months ago
Kinetic KD-trees and longest-side KD-trees
We propose a simple variant of kd-trees, called rank-based kd-trees, for sets of points in Rd . We show that a rank-based kd-tree, like an ordinary kd-tree, supports range search ...
Mohammad Ali Abam, Mark de Berg, Bettina Speckmann
DGO
2008
112views Education» more  DGO 2008»
13 years 11 months ago
Mapping theory to practice: a cartographic analysis of public safety networks
This paper provides an interim report on ongoing data collection and analysis efforts as part of a large-scale study of information technology- focused interagency collaborations ...
Christine B. Williams, M. Lynne Markus, Michael Ty...