Sciweavers

820 search results - page 61 / 164
» Memory System Connectivity Exploration
Sort
View
CCS
2008
ACM
15 years 5 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
CORR
2010
Springer
148views Education» more  CORR 2010»
15 years 3 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win
SJIS
2002
79views more  SJIS 2002»
15 years 2 months ago
Located Accountabilities in Technology Production
This paper explores the relevance of recent feminist reconstructions of objectivity for the development of alternative practices of technology production and use. I take as my sta...
Lucy A. Suchman
ACL
2009
15 years 1 months ago
Detecting Compositionality in Multi-Word Expressions
Identifying whether a multi-word expression (MWE) is compositional or not is important for numerous NLP applications. Sense induction can partition the context of MWEs into semant...
Ioannis Korkontzelos, Suresh Manandhar
AAAI
2008
15 years 5 months ago
Memetic Networks: Analyzing the Effects of Network Properties in Multi-Agent Performance
We explore the relationship between properties of the network defined by connected agents and the global system performance. This is achieved by means of a novel class of optimiza...
Ricardo M. Araujo, Luís C. Lamb