• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 69
Next 10 →

POSTER: Making the Case for Intrinsic Personal Physical Unclonable Functions (IP-PUFs) [Extended Abstract]

by Rishab Nithyanand, Radu Sion, John Solis
"... Physical Unclonable Functions (PUFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure but difficult to clone. The unclonability property is due to the accepted hardness of replicating the multitude of uncontrollable manufac-turing characteristics and makes ..."
Abstract - Add to MetaCart
Physical Unclonable Functions (PUFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure but difficult to clone. The unclonability property is due to the accepted hardness of replicating the multitude of uncontrollable manufac-turing characteristics

Solving the Software Protection Problem with Intrinsic Personal Physical Unclonable Functions

by Rishab Nithyan, Radu Sion, John Solis , 2011
"... a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Issued by Sandia National Laboratories, operated for the United State ..."
Abstract - Add to MetaCart
, or their employees, make any warranty, express or implied, or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or rep-resent that its use would not infringe privately owned rights. Reference herein to any specific

The role of friends' appearance and behavior on evaluations of individuals on Facebook: Are we known by the company we keep?.

by Joseph B Walther , Brandon Van Der Heide , Sang-Yeon Kim , David Westerman , Stephanie Tom Tong , Joseph B Walther - Human Communication Research, , 2008
"... This research explores how cues deposited by social partners onto one's online networking profile affect observers' impressions of the profile owner. An experiment tested the relationships between both (a) what one's associates say about a person on a social network site via '&a ..."
Abstract - Cited by 65 (0 self) - Add to MetaCart
other online sites for self-presentation has to do precisely with the degree to which some personal information is presented by means other than disclosure by the person to whom it refers. In many other communication settings, as Petronio (2002) notes, people make active decisions about when and how

LEADERS ON THE COUCH: THE CASE OF ROBERTO CALVI

by Manfred Kets, De Vries, Manfred F. R, Kets Vries, Christina Davis, Jane Petry, Sally Simmons
"... I would like to express my appreciation for the help of ..."
Abstract - Add to MetaCart
I would like to express my appreciation for the help of

Name:...................................... Date:....................................

by André Butler , 2010
"... belowground functioning of tropical biomes ..."
Abstract - Add to MetaCart
belowground functioning of tropical biomes

Akamai Technologies Limited

by Ioana Boureanu, Miyako Ohkubo, Serge Vaudenay
"... UC security realized with setup devices imposes that single in-stances of these setups are used. In most cases, UC-realization relies further on other properties of the setups devices, like tamper-resistance. But what happens in stronger versions of the UC frame-work, like EUC or JUC, where multiple ..."
Abstract - Add to MetaCart
not (publicly) disclose if they have been maliciously passed on. Further, we prove the general result that one cannot realize oblivious transfer (OT) or any “interesting ” 2-party protocol using transferable setups in the EUC model. As a by-product, we show that physically unclonable functions (PUFs) themselves

ACTA UNIVERSITATIS UPSALIENSIS

by unknown authors
"... Wireless sensor networks are used to collect sensor data in different applications such as environmental monitoring, smart building control, and health care applications. Wireless sensor nodes used are typically small, low-cost, and battery powered. The nodes are often hard to access after deploymen ..."
Abstract - Add to MetaCart
interference. This makes it important to evaluate a wireless sensor network in its intendent target environment before final deployment. To enable experiments with wireless sensor networks in their target environment, we have designed and implemented a testbed called Sensei-UU. It is designed to allow WSN

Active Mask Framework for Segmentation of Fluorescence Microscope Images

by Gowri Srinivasa, Advisor Prof, Prof Matthew, C. Fickus, Prof Adam, D. Linstedt, Prof Robert, F. Murphy
"... m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of ..."
Abstract - Add to MetaCart
m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of knowledge and a book in Her lotus hands. Dedicated to the Lotus Feet of the revered Sadguru. This thesis presents a new active mask (AM) framework and an algorithm for segmenta-tion of digital images, particularly those of punctate patterns from fluorescence microscopy. Fluorescence microscopy has greatly facilitated the task of understanding complex sys-tems at cellular and molecular levels in recent years. Segmentation, an important yet dif-ficult problem, is often the first processing step following acquisition. Our team previously demonstrated that a stochastic active contour based algorithm together with the concept of

Title of Document: QUANTUM MECHANICS AND QUANTUM INFORMATION THEORY

by unknown authors
"... The principle aim of this dissertation is to investigate the philosophical application of quantum information theory to interpretational issues regarding the theory of quantum mechanics. Recently, quantum information theory has emerged as a potential source for such an interpretation. The main quest ..."
Abstract - Add to MetaCart
The principle aim of this dissertation is to investigate the philosophical application of quantum information theory to interpretational issues regarding the theory of quantum mechanics. Recently, quantum information theory has emerged as a potential source for such an interpretation. The main question with which this dissertation will be concerned is whether or not an information-theoretic interpretation can serve as a conceptually acceptable interpretation of quantum mechanics. It will be argued that some of the more obvious approaches – that quantum information theory shows us that ultimately the world is made of information, and quantum Bayesianism – fail as philosophical interpretations of quantum mechanics. However, the information-theoretic approach of Clifton, Bub, and Halvorson introduces Einstein’s distinction between principle theories and constructive theories, arguing that quantum mechanics is best understood as an information-theoretic principle theory. While I argue that this particular approach fails, it does offer a viable new philosophical role for information theory. Specifically, an investigation of interpretationally successful principle theories such as Newtonian mechanics, special relativity, and general

„. ^ RADIO CORPORATION OF AMERICA

by Part Geometric Optics, C. Spencer, Geoffrey Hyde , 1964
"... Department of Defense contractors must be established for DDC services or have their 'need-to-know ' certified by the cogrizant military agency of their project or contract." All other persons and organizations should apply to the: ..."
Abstract - Add to MetaCart
Department of Defense contractors must be established for DDC services or have their 'need-to-know ' certified by the cogrizant military agency of their project or contract." All other persons and organizations should apply to the:
Next 10 →
Results 1 - 10 of 69
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University