Sciweavers

5494 search results - page 994 / 1099
» E-services Management Requirements
Sort
View
CCS
2009
ACM
15 years 7 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
KDD
2009
ACM
205views Data Mining» more  KDD 2009»
15 years 7 months ago
From active towards InterActive learning: using consideration information to improve labeling correctness
Data mining techniques have become central to many applications. Most of those applications rely on so called supervised learning algorithms, which learn from given examples in th...
Abraham Bernstein, Jiwen Li
124
Voted
CCECE
2009
IEEE
15 years 7 months ago
Design and implementation of a low-power workstation
A workstation requires a low-power design similar to a typical PC. In this paper we propose several strategies to reduce the power consumption of a workstation. First, we must com...
Ying-Wen Bai, Chun-Yang Tsai
123
Voted
CODES
2009
IEEE
15 years 7 months ago
A standby-sparing technique with low energy-overhead for fault-tolerant hard real-time systems
Time redundancy (rollback-recovery) and hardware redundancy are commonly used in real-time systems to achieve fault tolerance. From an energy consumption point of view, time redun...
Alireza Ejlali, Bashir M. Al-Hashimi, Petru Eles
125
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li