Sciweavers

5068 search results - page 923 / 1014
» Basic Computations in Wireless Networks
Sort
View
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
15 years 6 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
ICDCSW
2006
IEEE
15 years 4 months ago
The Key Knob
Locks are mechanical fastening devices used on various kinds of objects like doors and vehicles, and they can be released using a certain type of key. They have a long history, fr...
Alois Ferscha, Clemens Holzmann, Stefan Resmerita
PRDC
2005
IEEE
15 years 3 months ago
Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime
An important issue in modern cache designs is bridging the gap between wire and device delays. This warrants the use of more regular and modular structures to mask wire latencies....
Heng Xu, Arun K. Somani
SC
2005
ACM
15 years 3 months ago
Intelligent Feature Extraction and Tracking for Visualizing Large-Scale 4D Flow Simulations
Terascale simulations produce data that is vast in spatial, temporal, and variable domains, creating a formidable challenge for subsequent analysis. Feature extraction as a data r...
Fan-Yin Tzeng, Kwan-Liu Ma
ISBI
2011
IEEE
14 years 1 months ago
Sparse topological data recovery in medical images
For medical image analysis, the test statistic of the measurements is usually constructed at every voxels in space and thresholded to determine the regions of significant signals...
Moo K. Chung, Hyekyoung Lee, Peter T. Kim, Jong Ch...