Sciweavers

334 search results - page 67 / 67
» Adaptive Security Metrics for Computer Systems
Sort
View
GECCO
2008
Springer
114views Optimization» more  GECCO 2008»
13 years 6 months ago
Strategic positioning in tactical scenario planning
Capability planning problems are pervasive throughout many areas of human interest with prominent examples found in defense and security. Planning provides a unique context for op...
James M. Whitacre, Hussein A. Abbass, Ruhul A. Sar...
MICRO
2008
IEEE
136views Hardware» more  MICRO 2008»
13 years 11 months ago
Power to the people: Leveraging human physiological traits to control microprocessor frequency
Any architectural optimization aims at satisfying the end user. However, modern architectures execute with little to no knowledge about the individual user. If architectures could...
Alex Shye, Yan Pan, Benjamin Scholbrock, J. Scott ...
JAMIA
2010
115views more  JAMIA 2010»
13 years 6 days ago
The population health record: concepts, definition, design, and implementation
In 1997, the American Medical Informatics Association proposed a US information strategy that included a population health record (PopHR). Despite subsequent progress on the conce...
Daniel J. Friedman, R. Gibson Parrish II
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
13 years 12 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs