Sciweavers

657 search results - page 61 / 132
» A Version Numbering Scheme with a Useful Lexicographical Ord...
Sort
View
ASPLOS
2006
ACM
14 years 11 months ago
Tradeoffs in fine-grained heap memory protection
Different uses of memory protection schemes have different needs in terms of granularity. For example, heap security can benefit from chunk separation (by using protected "pa...
Jianli Shen, Guru Venkataramani, Milos Prvulovic
VLDB
2002
ACM
132views Database» more  VLDB 2002»
14 years 9 months ago
An Automated System for Web Portal Personalization
This paper proposes a system for personalization of web portals. A speci c implementation is discussed in reference to a web portal containing a news feed service. Techniques are ...
Charu C. Aggarwal, Philip S. Yu
WCNC
2008
IEEE
15 years 4 months ago
Iterative Detection of Three-Stage Concatenated FFH-MFSK
Abstract— Serially concatenated and iteratively decoded Irregular Variable Length Coding (IrVLC) combined with precoded Fast Frequency Hopping (FFH) M-ary Frequency Shift Keying ...
Sohail Ahmed, Robert G. Maunder, Lie-Liang Yang, L...
ICCSA
2010
Springer
14 years 11 months ago
An Identifiable Yet Unlinkable Authentication System with Smart Cards for Multiple Services
The purpose of this paper is to realize an authentication system which satisfies four requirements for security, privacy protection, and usability, that is, impersonation resistanc...
Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Ke...
AI
2010
Springer
14 years 10 months ago
On the measure of conflicts: Shapley Inconsistency Values
There are relatively few proposals for inconsistency measures for propositional belief bases. However inconsistency measures are potentially as important as information measures f...
Anthony Hunter, Sébastien Konieczny