Sciweavers

8655 search results - page 1266 / 1731
» Challenges for Trusted Computing
Sort
View
VLSID
2009
IEEE
143views VLSI» more  VLSID 2009»
16 years 5 months ago
SACR: Scheduling-Aware Cache Reconfiguration for Real-Time Embedded Systems
Dynamic reconfiguration techniques are widely used for efficient system optimization. Dynamic cache reconfiguration is a promising approach for reducing energy consumption as well...
Weixun Wang, Prabhat Mishra, Ann Gordon-Ross
EUROCRYPT
2009
Springer
16 years 5 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
MOBIHOC
2009
ACM
16 years 5 months ago
3DLS: density-driven data location service for mobile ad-hoc networks
Finding data items is one of the most basic services of any distributed system. It is particular challenging in ad-hoc networks, due to their inherent decentralized nature and lac...
Roy Friedman, Noam Mori
KDD
2008
ACM
243views Data Mining» more  KDD 2008»
16 years 4 months ago
Permu-pattern: discovery of mutable permutation patterns with proximity constraint
Pattern discovery in sequences is an important problem in many applications, especially in computational biology and text mining. However, due to the noisy nature of data, the tra...
Meng Hu, Jiong Yang, Wei Su
KDD
2008
ACM
209views Data Mining» more  KDD 2008»
16 years 4 months ago
Combinational collaborative filtering for personalized community recommendation
Rapid growth in the amount of data available on social networking sites has made information retrieval increasingly challenging for users. In this paper, we propose a collaborativ...
WenYen Chen, Dong Zhang, Edward Y. Chang
« Prev « First page 1266 / 1731 Last » Next »