Sciweavers

1303 search results - page 252 / 261
» Ambient Information Systems: Evaluation in Two Paradigms
Sort
View
TRUST
2010
Springer
15 years 4 months ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
ICDCS
2000
IEEE
15 years 4 months ago
Scheduling Heuristics for Data Requests in an Oversubscribed Network with Priorities and Deadlines
Providing up-to-date input to users’ applications is an important data management problem for a distributed computing environment, where each data storage location and intermedi...
Mitchell D. Theys, Noah Beck, Howard Jay Siegel, M...
BMCBI
2008
158views more  BMCBI 2008»
14 years 11 months ago
Discovering gene annotations in biomedical text databases
Currently, most of the discovered biological and biomedical knowledge is available as textual data in scientific papers. And, locating and curating information about a genomic enti...
Ali Cakmak, Gultekin Özsoyoglu
113
Voted
IM
2007
14 years 11 months ago
Cluster Generation and Labeling for Web Snippets: A Fast, Accurate Hierarchical Solution
This paper describes Armil, a meta-search engine that groups the web snippets returned by auxiliary search engines into disjoint labeled clusters. The cluster labels generated by A...
Filippo Geraci, Marco Pellegrini, Marco Maggini, F...
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
14 years 9 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...