Sciweavers

1019 search results - page 153 / 204
» Cryptographic Design Vulnerabilities
Sort
View
SDM
2008
SIAM
139views Data Mining» more  SDM 2008»
15 years 1 months ago
Maximal Quasi-Bicliques with Balanced Noise Tolerance: Concepts and Co-clustering Applications
The rigid all-versus-all adjacency required by a maximal biclique for its two vertex sets is extremely vulnerable to missing data. In the past, several types of quasi-bicliques ha...
Jinyan Li, Kelvin Sim, Guimei Liu, Limsoon Wong
WICON
2008
15 years 1 months ago
Towards optimally exploiting physical layer information in OFDM wireless networks
Wireless communication is inherently vulnerable in nature and packets can be corrupted due to various reasons. The network performance can potentially be improved if one is able t...
Zheng Zeng, P. R. Kumar
CSREASAM
2006
15 years 1 months ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
ERSA
2006
102views Hardware» more  ERSA 2006»
15 years 1 months ago
Process Isolation for Reconfigurable Hardware
One of the pillars of trust-worthy computing is process isolation, the ability to keep process data private from other processes running on the same device. While embedded operati...
Herwin Chan, Patrick Schaumont, Ingrid Verbauwhede
FECS
2006
103views Education» more  FECS 2006»
15 years 1 months ago
TMAS A Capstone Project
The College of Engineering and Computer Science at the University of Tennessee at Chattanooga (UTC) requires all undergraduate seniors to participate in a capstone project designe...
Joseph M. Kizza, Li Yang, Andy Novobilski, Kathy W...