Results 1 - 10
of
69
POSTER: Making the Case for Intrinsic Personal Physical Unclonable Functions (IP-PUFs) [Extended Abstract]
"... Physical Unclonable Functions (PUFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure but difficult to clone. The unclonability property is due to the accepted hardness of replicating the multitude of uncontrollable manufac-turing characteristics and makes ..."
Abstract
- Add to MetaCart
Physical Unclonable Functions (PUFs) are physical systems whose responses to input stimuli (i.e., challenges) are easy to measure but difficult to clone. The unclonability property is due to the accepted hardness of replicating the multitude of uncontrollable manufac-turing characteristics
Solving the Software Protection Problem with Intrinsic Personal Physical Unclonable Functions
, 2011
"... a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Issued by Sandia National Laboratories, operated for the United State ..."
Abstract
- Add to MetaCart
, or their employees, make any warranty, express or implied, or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or rep-resent that its use would not infringe privately owned rights. Reference herein to any specific
The role of friends' appearance and behavior on evaluations of individuals on Facebook: Are we known by the company we keep?.
- Human Communication Research,
, 2008
"... This research explores how cues deposited by social partners onto one's online networking profile affect observers' impressions of the profile owner. An experiment tested the relationships between both (a) what one's associates say about a person on a social network site via '&a ..."
Abstract
-
Cited by 65 (0 self)
- Add to MetaCart
other online sites for self-presentation has to do precisely with the degree to which some personal information is presented by means other than disclosure by the person to whom it refers. In many other communication settings, as Petronio (2002) notes, people make active decisions about when and how
LEADERS ON THE COUCH: THE CASE OF ROBERTO CALVI
"... I would like to express my appreciation for the help of ..."
Name:...................................... Date:....................................
, 2010
"... belowground functioning of tropical biomes ..."
Akamai Technologies Limited
"... UC security realized with setup devices imposes that single in-stances of these setups are used. In most cases, UC-realization relies further on other properties of the setups devices, like tamper-resistance. But what happens in stronger versions of the UC frame-work, like EUC or JUC, where multiple ..."
Abstract
- Add to MetaCart
not (publicly) disclose if they have been maliciously passed on. Further, we prove the general result that one cannot realize oblivious transfer (OT) or any “interesting ” 2-party protocol using transferable setups in the EUC model. As a by-product, we show that physically unclonable functions (PUFs) themselves
ACTA UNIVERSITATIS UPSALIENSIS
"... Wireless sensor networks are used to collect sensor data in different applications such as environmental monitoring, smart building control, and health care applications. Wireless sensor nodes used are typically small, low-cost, and battery powered. The nodes are often hard to access after deploymen ..."
Abstract
- Add to MetaCart
interference. This makes it important to evaluate a wireless sensor network in its intendent target environment before final deployment. To enable experiments with wireless sensor networks in their target environment, we have designed and implemented a testbed called Sensei-UU. It is designed to allow WSN
Active Mask Framework for Segmentation of Fluorescence Microscope Images
"... m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of ..."
Abstract
- Add to MetaCart
m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of knowledge and a book in Her lotus hands. Dedicated to the Lotus Feet of the revered Sadguru. This thesis presents a new active mask (AM) framework and an algorithm for segmenta-tion of digital images, particularly those of punctate patterns from fluorescence microscopy. Fluorescence microscopy has greatly facilitated the task of understanding complex sys-tems at cellular and molecular levels in recent years. Segmentation, an important yet dif-ficult problem, is often the first processing step following acquisition. Our team previously demonstrated that a stochastic active contour based algorithm together with the concept of
Title of Document: QUANTUM MECHANICS AND QUANTUM INFORMATION THEORY
"... The principle aim of this dissertation is to investigate the philosophical application of quantum information theory to interpretational issues regarding the theory of quantum mechanics. Recently, quantum information theory has emerged as a potential source for such an interpretation. The main quest ..."
Abstract
- Add to MetaCart
The principle aim of this dissertation is to investigate the philosophical application of quantum information theory to interpretational issues regarding the theory of quantum mechanics. Recently, quantum information theory has emerged as a potential source for such an interpretation. The main question with which this dissertation will be concerned is whether or not an information-theoretic interpretation can serve as a conceptually acceptable interpretation of quantum mechanics. It will be argued that some of the more obvious approaches – that quantum information theory shows us that ultimately the world is made of information, and quantum Bayesianism – fail as philosophical interpretations of quantum mechanics. However, the information-theoretic approach of Clifton, Bub, and Halvorson introduces Einstein’s distinction between principle theories and constructive theories, arguing that quantum mechanics is best understood as an information-theoretic principle theory. While I argue that this particular approach fails, it does offer a viable new philosophical role for information theory. Specifically, an investigation of interpretationally successful principle theories such as Newtonian mechanics, special relativity, and general
„. ^ RADIO CORPORATION OF AMERICA
, 1964
"... Department of Defense contractors must be established for DDC services or have their 'need-to-know ' certified by the cogrizant military agency of their project or contract." All other persons and organizations should apply to the: ..."
Abstract
- Add to MetaCart
Department of Defense contractors must be established for DDC services or have their 'need-to-know ' certified by the cogrizant military agency of their project or contract." All other persons and organizations should apply to the:
Results 1 - 10
of
69