Sciweavers

2250 search results - page 87 / 450
» Authorizing applications in singularity
Sort
View
ISMVL
2008
IEEE
134views Hardware» more  ISMVL 2008»
15 years 4 months ago
Multiple-Valued Logic Memory System Design Using Nanoscale Electrochemical Cells
Nanoscale multiple-valued logic systems require the development of nanometer scale integrated circuits and components. Due to limits in device physics, new components must be deve...
Theodore W. Manikas, Dale Teeters
59
Voted
ICDM
2006
IEEE
89views Data Mining» more  ICDM 2006»
15 years 4 months ago
Plagiarism Detection in arXiv
We describe a large-scale application of methods for finding plagiarism and self-plagiarism in research document collections. The methods are applied to a collection of 284,834 d...
Daria Sorokina, Johannes Gehrke, Simeon Warner, Pa...
ADVIS
2006
Springer
15 years 3 months ago
Chat Mining for Gender Prediction
Abstract. The aim of this paper is to investigate the feasibility of predicting the gender of a text document’s author using linguistic evidence. For this purpose, term- and styl...
Tayfun Kucukyilmaz, Berkant Barla Cambazoglu, Cevd...
AINA
2005
IEEE
15 years 3 months ago
Dynamic Key Generations for Secret Sharing in Access Structures
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen
COLCOM
2009
IEEE
15 years 2 months ago
The PEI framework for application-centric security
This paper motivates the fundamental importance of application context for security. It then gives an overview of the PEI framework for application-centric security and outlines s...
Ravi S. Sandhu