Sciweavers

2956 search results - page 327 / 592
» Databases and Higher Types
Sort
View
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 8 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
GLOBECOM
2009
IEEE
15 years 8 months ago
Route Capacity Estimation Based Admission Control and QoS Routing for Mesh Networks
Wireless Mesh Networks (WMNs) is a promising key technology for next generation wireless backhauling that is expected to support various types of applications with different qualit...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung
ASAP
2004
IEEE
126views Hardware» more  ASAP 2004»
15 years 8 months ago
Hyper-Programmable Architectures for Adaptable Networked Systems
We explain how modern programmable logic devices have capabilities that are well suited for them to assume a central role in the implementation of networked systems, now and in th...
Gordon J. Brebner, Philip James-Roxby, Eric Keller...
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
15 years 8 months ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick
AUSDM
2006
Springer
85views Data Mining» more  AUSDM 2006»
15 years 8 months ago
A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses
The importance of predicting Web users' behaviour and their next movement has been recognised and discussed by many researchers lately. Association rules and Markov models ar...
Faten Khalil, Jiuyong Li, Hua Wang