Sciweavers

2779 search results - page 460 / 556
» Modelling Immunological Memory
Sort
View
SOUPS
2009
ACM
15 years 7 months ago
Graphical passwords as browser extension: implementation and usability study
Abstract: Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based ...
Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Haka...
DSN
2008
IEEE
15 years 7 months ago
SymPLFIED: Symbolic program-level fault injection and error detection framework
This paper introduces SymPLFIED, a program-level framework which allows specification of arbitrary error detectors and the verification of their efficacy against hardware errors. ...
Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalba...
102
Voted
GLVLSI
2008
IEEE
137views VLSI» more  GLVLSI 2008»
15 years 7 months ago
Phase-based cache reconfiguration for a highly-configurable two-level cache hierarchy
Phase-based tuning methodologies specialize system parameters for each application phase of execution. Parameters are varied during execution, as opposed to remaining fixed as in ...
Ann Gordon-Ross, Jeremy Lau, Brad Calder
88
Voted
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
15 years 7 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
90
Voted
ICC
2008
IEEE
127views Communications» more  ICC 2008»
15 years 7 months ago
MIMO Optical Wireless Channels Using Halftoning
— Two-dimensional (2D) optical intensity channels exist in a variety of applications including holographic storage, page-oriented memories, optical interconnects, 2D barcodes, as...
Mohamed D. A. Mohamed, Awad Dabbo, Steve Hranilovi...