Sciweavers

1627 search results - page 297 / 326
» High Security Smartcards
Sort
View
119
Voted
JSAC
2008
199views more  JSAC 2008»
15 years 21 days ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed
SIGOPS
2008
146views more  SIGOPS 2008»
15 years 20 days ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
117
Voted
SP
2008
IEEE
122views Security Privacy» more  SP 2008»
15 years 20 days ago
Large-scale phylogenetic analysis on current HPC architectures
Abstract. Phylogenetic inference is considered a grand challenge in Bioinformatics due to its immense computational requirements. The increasing popularity and availability of larg...
Michael Ott, Jaroslaw Zola, Srinivas Aluru, Andrew...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 20 days ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
127
Voted
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 20 days ago
Discover gene specific local co-regulations from time-course gene expression data
Discovering gene co-regulatory relationships is one of most important research in DNA microarray data analysis. The problem of gene specific co-regulation discovery is to, for a p...
Ji Zhang, Qigang Gao, Hai H. Wang