Sciweavers

1102 search results - page 157 / 221
» Distributed Key Generation for the Internet
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 9 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ESCIENCE
2005
IEEE
15 years 8 months ago
Grid-Enabling an Existing Instrument-Based National Service
Recent work by the ‘CombeChem’ project together with the UK National Crystallography Service (NCS) has integrated the NCS into an e-Science environment. The existing high-thro...
Jeremy G. Frey, Sam Peppe, Mike Surridge, Ken Meac...
EMSOFT
2005
Springer
15 years 8 months ago
From statecharts to ESP: programming with events, states and predicates for embedded systems
Statecharts are probably the most popular mechanism for behavior modeling of embedded system components. Modeling a component involves using a mainstream language for features tha...
Vugranam C. Sreedhar, Maria-Cristina V. Marinescu
IEEEPACT
2003
IEEE
15 years 8 months ago
Compilation, Architectural Support, and Evaluation of SIMD Graphics Pipeline Programs on a General-Purpose CPU
Graphics and media processing is quickly emerging to become one of the key computing workloads. Programmable graphics processors give designers extra flexibility by running a sma...
Mauricio Breternitz Jr., Herbert H. J. Hum, Sanjee...
117
Voted
APSEC
2000
IEEE
15 years 7 months ago
Component-based application development on architecture of a model, UI and components
Explosive increase in end-user computing on distributed systems requires that end-users develop application software by themselves. One solution is given as a formula of “a doma...
Takeshi Chusho, Hisashi Ishigure, Naoyuki Konda, T...