Sciweavers

754 search results - page 113 / 151
» Architectural Design Recovery using Data Mining Techniques
Sort
View
88
Voted
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 3 months ago
The Illusion of Effective Management Information: A Critical Perspective
The availability of effective management information is essential when coping with today’s complexity and dynamism, both within and around organizations. Information technology ...
Fred A. B. Lohman, Henk G. Sol, Gert-Jan de Vreede
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
15 years 3 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
WISEC
2010
ACM
14 years 10 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ASPDAC
2006
ACM
127views Hardware» more  ASPDAC 2006»
15 years 3 months ago
Memory size computation for multimedia processing applications
– In real-time multimedia processing systems a very large part of the power consumption is due to the data storage and data transfer. Moreover, the area cost is often largely dom...
Hongwei Zhu, Ilie I. Luican, Florin Balasa
MLDM
2005
Springer
15 years 3 months ago
Supervised Evaluation of Dataset Partitions: Advantages and Practice
In the context of large databases, data preparation takes a greater importance : instances and explanatory attributes have to be carefully selected. In supervised learning, instanc...
Sylvain Ferrandiz, Marc Boullé