Sciweavers

19010 search results - page 3793 / 3802
» Adaptive A
Sort
View
IACR
2011
86views more  IACR 2011»
13 years 10 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
ICDAR
2011
IEEE
13 years 10 months ago
Ternary Entropy-Based Binarization of Degraded Document Images Using Morphological Operators
—A vast number of historical and badly degraded document images can be found in libraries, public, and national archives. Due to the complex nature of different artifacts, such p...
T. Hoang Ngan Le, Tien D. Bui, Ching Y. Suen
ICDCS
2011
IEEE
13 years 10 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
ICDCS
2011
IEEE
13 years 10 months ago
Delay-Cognizant Reliable Delivery for Publish/Subscribe Overlay Networks
—The number of real-world applications that require QoS guarantees is constantly increasing and they often follow the publish/subscribe (pub/sub) messaging paradigm, which provid...
Shuo Guo, Kyriakos Karenos, Minkyong Kim, Hui Lei,...
AAMAS
2012
Springer
13 years 6 months ago
Using argumentation to model agent decision making in economic experiments
In this paper we demonstrate how a qualitative framework for decision making can be used to model scenarios from experimental economic studies and we show how our approach explains...
Trevor J. M. Bench-Capon, Katie Atkinson, Peter Mc...
« Prev « First page 3793 / 3802 Last » Next »