Key pre-distribution techniques for security provision of Wireless Sensor Networks (WSNs) have attracted significant interests recently. In these schemes, a relatively small number of keys are randomly chosen from a l...
详细信息
Sterically shielded …︁ …︁ nanoparticles diffuse freely in solution and biological fluids until proteases expressed by cancer cells trigger them to self-assemble. In their Communication on page 3161ff., S. N. Bhatia ...
详细信息
Sterically shielded …︁ …︁ nanoparticles diffuse freely in solution and biological fluids until proteases expressed by cancer cells trigger them to self-assemble. In their Communication on page 3161ff., S. N. Bhatia and co-workers show that complimentary Fe 3 O 4 nanoparticle binding is inhibited by the attachment of protease-cleavable polymers. Cleavage of these polymers triggers “latent” nanoparticles to form multimeric assemblies with emergent properties.
Selective synthesis of silica nanowires on silicon wafers catalyzed by Pd ion implantation is *** of palladium suicide acts as seeds for nucleation of wires following a Vapor-Liquid-Solid (VLS) growth model. The consu...
详细信息
Conducting a national study in the computing sciences is a process that requires detailed planning and a consistent effort by researchers to accomplish the study's goals. This paper discusses the many challenges t...
详细信息
Conducting a national study in the computing sciences is a process that requires detailed planning and a consistent effort by researchers to accomplish the study's goals. This paper discusses the many challenges that were addressed when organizing and implementing a large study involving 50 colleges and universities from across the United States. Issues affecting both the coordinating institution, Xavier university of la, and one of the participating institutions, the university of Cincinnati, are discussed. The issues include the survey administration details, confidentiality and security of the survey data, evaluation of survey software packages, recruitment and retention of the participating institutions, the processes for Institutional Review Board approvals, and recruitment and compensation of students. The lessons that were learned by the researchers at Xavier are organized into a suggested methodology for conducting surveys of this scope
A design for test (DFT) hardware is proposed to increase the controllability of a thermometer coded current steering digital to analog converter. A procedure is introduced to reduce the diagnosis and structural test t...
详细信息
A design for test (DFT) hardware is proposed to increase the controllability of a thermometer coded current steering digital to analog converter. A procedure is introduced to reduce the diagnosis and structural test time from quadratic to linear using the proposed DFT hardware. To evaluate the applicability of the proposed technique, principal component analysis is used to create virtual process variations to simulate in lieu of semiconductor fabrication data. An architecture specific soft fault model is suggested for the diagnosis problem. Random errors according to the fault model are introduced in the virtual test environment on top of the process variations and it is shown that diagnosis of a fault is possible with high accuracy with the proposed method. The same technique employing principal component analysis is furthermore used to provide process variation-aware reference test comparison values for a structural test of the DAC. The structural test provides a mechanism to test for even unmodeled manufacturing faults. The process variation-aware test values help detect defects even under process variations. The proposed DFT hardware and method are low cost and quite suitable for a built-in self diagnosis and test implementation.
I/O libraries such as PANDA and DRA use blocked layouts for efficient access to disk-resident multi-dimensional arrays, with the shape of the blocks being chosen to match the expected access pattern of the array. Some...
详细信息
Instructors of computerscience, engineering, and technology courses often teach using prepared slides displayed with a computer and data projector. While this approach has advantages, disadvantages can be severe - in...
详细信息
Instructors of computerscience, engineering, and technology courses often teach using prepared slides displayed with a computer and data projector. While this approach has advantages, disadvantages can be severe - including limited flexibility in delivery of material, which hinders instructors' spontaneous adaptation to students. This paper describes Classroom Presenter, a Tablet PC-based presentation system that (1) allows instructors to regain flexibility in presentation using Tablet PC-supported digital inking in an application specifically designed for lecturing use, (2) supports role-specific views and interaction mechanisms in class, and (3) introduces novel affordances including the use of wireless technology and student devices to support active learning in the classroom. As of spring 2005, Classroom Presenter has been used in over 200 courses at more than 13 institutions. Here we take advantage of our large use-base to discuss Classroom Presenter's impact on student learning and summarize best practices for lecturing with this technology
In this paper, we introduce the concept of additive zero knowledge. Essentially, an additive proof can be considered as a proof system involving many provers and one verifier such that the statements of all the prover...
详细信息
In this paper, we introduce the concept of additive zero knowledge. Essentially, an additive proof can be considered as a proof system involving many provers and one verifier such that the statements of all the provers are proved simultaneously. Our model of additive proofs is presented using constructions of blind group identification, aggregate signatures and chained signatures. The security of our protocols relies on the difficulty of the underlying Diffie-Hellman problem in bilinear maps. As applications, we present a novel method to prevent spam.
Risk is associated with almost every activity that is undertaken on a daily life. Risk associated with Trust, Security and Privacy. Risk is associated with transactions, businesses, information systems, environments, ...
详细信息
Risk is associated with almost every activity that is undertaken on a daily life. Risk associated with Trust, Security and Privacy. Risk is associated with transactions, businesses, information systems, environments, networks, partnerships, etc. Generally speaking, risk signifies the likelihood of financial losses, human casualties, business destruction and environmental damages. Risk indicator gives early warning to the party involved and helps avoid deserters. Until now, risk has been discussed extensively in the areas of investment, finance, health, environment, daily life activities and engineering. However, there is no systematic study of risk in Decentralised communication, which involves e-business, computer networks and service oriented environment. In this paper, we define risk associated with trusted communication in e-business and e-transactions; provide risk indicator calculations and basic application areas.
We present QoS Geometric Broadcast Protocol (QoS-GBP), a novel broadcasting protocol for heterogeneous wireless ad hoc and sensor networks. While broadcasting is a very energy-expensive protocol, it is also widely use...
详细信息
暂无评论