Sciweavers

1563 search results - page 277 / 313
» An Increase In Value
Sort
View
MICRO
2008
IEEE
208views Hardware» more  MICRO 2008»
15 years 6 months ago
Microarchitecture soft error vulnerability characterization and mitigation under 3D integration technology
— As semiconductor processing techniques continue to scale down, transient faults, also known as soft errors, are increasingly becoming a reliability threat to high-performance m...
Wangyuan Zhang, Tao Li
NDSS
2008
IEEE
15 years 6 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
CBMS
2007
IEEE
15 years 6 months ago
Influence of Dictionary Size on the Lossless Compression of Microarray Images
A key challenge in the management of microarray data is the large size of images that constitute the output of microarray experiments. Therefore, only the expression values extrac...
Robert Bierman, Rahul Singh
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
15 years 6 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
ICC
2007
IEEE
118views Communications» more  ICC 2007»
15 years 6 months ago
Service Roaming over Mobile Networks: A Reality Check
—Today, international mobile roaming (IMR) is experiencing changes both in terms of technology and business models. Traditionally, voice and SMS have been the only services offer...
K. R. Renjish Kumar