Sciweavers

2957 search results - page 480 / 592
» Code analysis and CS-XML
Sort
View
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
15 years 6 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
DGO
2008
112views Education» more  DGO 2008»
15 years 5 months ago
Relating taxonomies with regulations
Increasingly, taxonomies are being developed for a wide variety of industrial domains and specific applications within those domains. These industry or application specific taxono...
Chin Pang Cheng, Jiayi Pan, Gloria T. Lau, Kincho ...
IADIS
2003
15 years 5 months ago
Informatization and E-Business Model Application for Distributed Data Mining Using Mobile Agents
Distributed data mining (DDM) is the semi-automatic pattern extraction of distributed data sources. The next generation of the data mining studies will be distributed data mining ...
Ezendu Ifeanyi Ariwa, Mohamed B. Senousy, Mohamed ...
USENIX
2001
15 years 5 months ago
Page Replacement in Linux 2.4 Memory Management
While the virtual memory management in Linux 2.2 has decent performance for many workloads, it suffers from a number of problems. The first part of this paper contains a descripti...
Rik van Riel
BMCBI
2008
143views more  BMCBI 2008»
15 years 4 months ago
Gene identification and protein classification in microbial metagenomic sequence data via incremental clustering
Background: The identification and study of proteins from metagenomic datasets can shed light on the roles and interactions of the source organisms in their communities. However, ...
Shibu Yooseph, Weizhong Li, Granger G. Sutton