Sciweavers

3836 search results - page 619 / 768
» Optimizing the Use of High Performance Software Libraries
Sort
View
GLOBECOM
2009
IEEE
15 years 11 months ago
Least Squares Estimation for the Digital Compensation of Tx Leakage in zero-IF Receivers
—Transmitter Leakage has a significant impact on the system performance in mobile devices using zero-IF receivers and thus requires a suitable compensation. In contrast to analo...
Andreas Frotzscher, Gerhard Fettweis
SACRYPT
2007
Springer
15 years 10 months ago
The Security of the Extended Codebook (XCB) Mode of Operation
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide...
David A. McGrew, Scott R. Fluhrer
ACSAC
1999
IEEE
15 years 8 months ago
Safe Areas of Computation for Secure Computing with Insecure Applications
Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
André L. M. dos Santos, Richard A. Kemmerer
INFOCOM
2006
IEEE
15 years 10 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
SSDBM
2010
IEEE
248views Database» more  SSDBM 2010»
15 years 9 months ago
Client + Cloud: Evaluating Seamless Architectures for Visual Data Analytics in the Ocean Sciences
Science is becoming data-intensive, requiring new software architectures that can exploit resources at all scales: local GPUs for interactive visualization, server-side multi-core ...
Keith Grochow, Bill Howe, Mark Stoermer, Roger S. ...