Sciweavers

2912 search results - page 520 / 583
» Overlay Networks - Implementation by Specification
Sort
View
ICISC
2008
129views Cryptology» more  ICISC 2008»
15 years 4 months ago
Novel PUF-Based Error Detection Methods in Finite State Machines
We propose a number of techniques for securing finite state machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on physically unclonable fun...
Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar
148
Voted
IIWAS
2008
15 years 4 months ago
Double-agent architecture for collaborative supply chain formation
Supply chains have evolved to web-applications that tap on the power of internet to expand their networks online. Recently some research attention is focused on make-to-order supp...
Yang Hang, Simon Fong
133
Voted
SDM
2008
SIAM
176views Data Mining» more  SDM 2008»
15 years 4 months ago
A General Model for Multiple View Unsupervised Learning
Multiple view data, which have multiple representations from different feature spaces or graph spaces, arise in various data mining applications such as information retrieval, bio...
Bo Long, Philip S. Yu, Zhongfei (Mark) Zhang
MSV
2007
15 years 4 months ago
FMC-QE: A New Approach in Quantitative Modeling
Abstract—Service requests are the origin of every service provisioning process and therefore the entities to be considered first. Similar to Physics and Engineering Sciences, ser...
Werner Zorn
AISM
2004
15 years 4 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...