Sciweavers

16190 search results - page 2644 / 3238
» Applicative programming with effects
Sort
View
DSN
2007
IEEE
15 years 10 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
ETS
2007
IEEE
81views Hardware» more  ETS 2007»
15 years 10 months ago
Parallel Scan-Like Testing and Fault Diagnosis Techniques for Digital Microfluidic Biochips
Dependability is an important attribute for microfluidic biochips that are used for safety-critical applications such as point-of-care health assessment, air-quality monitoring, a...
Tao Xu, Krishnendu Chakrabarty
FUZZIEEE
2007
IEEE
15 years 10 months ago
A Genetic-Fuzzy Mining Approach for Items with Multiple Minimum Supports
—In the past, we proposed a genetic-fuzzy data-mining algorithm for extracting both association rules and membership functions from quantitative transactions under a single minim...
Chun-Hao Chen, Tzung-Pei Hong, Vincent S. Tseng, C...
123
Voted
FUZZIEEE
2007
IEEE
15 years 10 months ago
Tolerance-based and Fuzzy-Rough Feature Selection
— One of the main obstacles facing the application of computational intelligence technologies in pattern recognition (and indeed in many other tasks) is that of dataset dimension...
Richard Jensen, Qiang Shen
GLOBECOM
2007
IEEE
15 years 10 months ago
Extension and Comparison of QoS-Enabled Wi-Fi Models in the Presence of Errors
—In this paper we compare and enhance the three prevailing approaches of IEEE 802.11e Performance analysis. Specifically, the first model utilizes a Markov Chain to describe th...
Ioannis Papapanagiotou, Georgios S. Paschos, Stavr...
« Prev « First page 2644 / 3238 Last » Next »