Sciweavers

1369 search results - page 117 / 274
» A Practical Implementation of the Timing Attack
Sort
View
RE
2010
Springer
14 years 5 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
AAI
2006
106views more  AAI 2006»
14 years 11 months ago
Metaheuristics for Handling Time Interval Coverage Constraints in Nurse Scheduling
The problem of finding a high quality timetable for personnel in a hospital ward has been addressed by many researchers, personnel managers and schedulers over a number of years. ...
Edmund K. Burke, Patrick De Causmaecker, Sanja Pet...
RTAS
2008
IEEE
15 years 5 months ago
Bounding Worst-Case Response Time for Tasks with Non-Preemptive Regions
Real-time schedulability theory requires a priori knowledge of the worst-case execution time (WCET) of every task in the system. Fundamental to the calculation of WCET is a schedu...
Harini Ramaprasad, Frank Mueller
BMCBI
2005
137views more  BMCBI 2005»
14 years 11 months ago
A standard curve based method for relative real time PCR data processing
Background: Currently real time PCR is the most precise method by which to measure gene expression. The method generates a large amount of raw numerical data and processing may no...
Alexey Larionov, Andreas Krause, William Miller
TMI
2008
126views more  TMI 2008»
14 years 11 months ago
A Time Domain Fluorescence Tomography System for Small Animal Imaging
We describe the application of a time domain diffuse fluorescence tomography system for whole body small animal imaging. The key features of the system are the use of point excitat...
Anand T. N. Kumar, Scott B. Raymond, Andrew K. Dun...