Sciweavers

304 search results - page 42 / 61
» pH-neutralization: integrated process and control design
Sort
View
CCS
2005
ACM
14 years 1 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
TROB
2008
107views more  TROB 2008»
13 years 7 months ago
Templates and Anchors for Antenna-Based Wall Following in Cockroaches and Robots
The interplay between robotics and neuromechanics facilitates discoveries in both fields: nature provides roboticists with design ideas, while robotics research elucidates critical...
J. Lee, S. N. Sponberg, Owen Y. Loh, Andrew G. Lam...
ASAP
2003
IEEE
169views Hardware» more  ASAP 2003»
14 years 27 days ago
Combined Multiplication and Sum-of-Squares Units
Multiplication and squaring are important operations in digital signal processing and multimedia applications. This paper presents designs for units that implement either multipli...
Michael J. Schulte, Louis Marquette, Shankar Krith...
ICPPW
2003
IEEE
14 years 26 days ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
COMPSEC
2008
116views more  COMPSEC 2008»
13 years 7 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...