Sciweavers

12493 search results - page 2359 / 2499
» Information Access in the Web
Sort
View
91
Voted
ACSAC
2008
IEEE
15 years 8 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
AINA
2007
IEEE
15 years 8 months ago
Database-Driven Grid Computing with GridBASE
The GridBASE framework for database-driven grid computing is presented. The design and a prototype implementation of the framework is discussed. Industry-strength database technol...
Hans De Sterck, Chen Zhang, Aleks Papo
CBMS
2007
IEEE
15 years 8 months ago
Influence of Dictionary Size on the Lossless Compression of Microarray Images
A key challenge in the management of microarray data is the large size of images that constitute the output of microarray experiments. Therefore, only the expression values extrac...
Robert Bierman, Rahul Singh
HICSS
2007
IEEE
258views Biometrics» more  HICSS 2007»
15 years 8 months ago
Enterprise Architecture and IT Governance: A Risk-Based Approach
The USCP had enormous challenges with its IT Program and support to the internal and external stakeholders of the Department, because of a fragile IT infrastructure. The IT Progra...
James R. Getter
146
Voted
ICC
2007
IEEE
214views Communications» more  ICC 2007»
15 years 8 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
« Prev « First page 2359 / 2499 Last » Next »