Sciweavers

1402 search results - page 185 / 281
» Design of an Automated System for Clustering Heterogeneous D...
Sort
View
ICAC
2009
IEEE
15 years 7 months ago
Applying genetic algorithms to decision making in autonomic computing systems
Increasingly, applications need to be able to self-reconfigure in response to changing requirements and environmental conditions. Autonomic computing has been proposed as a means...
Andres J. Ramirez, David B. Knoester, Betty H. C. ...
EIT
2008
IEEE
15 years 2 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
KDD
2004
ACM
117views Data Mining» more  KDD 2004»
16 years 1 months ago
Predicting customer shopping lists from point-of-sale purchase data
This paper describes a prototype that predicts the shopping lists for customers in a retail store. The shopping list prediction is one aspect of a larger system we have developed ...
Chad M. Cumby, Andrew E. Fano, Rayid Ghani, Marko ...
HIPEAC
2005
Springer
15 years 6 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
117
Voted
REALWSN
2010
14 years 7 months ago
K2: A System for Campaign Deployments of Wireless Sensor Networks
Abstract. Environmental scientists frequently engage in "campaignstyle" deployments, where they visit a location for a relatively short period of time (several weeks to m...
Douglas Carlson, Jayant Gupchup, Rob Fatland, Andr...