Sciweavers

3733 search results - page 534 / 747
» Performance Evaluation of an Operating System Transaction Ma...
Sort
View
MCS
2007
Springer
15 years 8 months ago
Index Driven Combination of Multiple Biometric Experts for AUC Maximisation
A biometric system produces a matching score representing the degree of similarity of the input with the set of templates for that user. If the score is greater than a prefixed th...
Roberto Tronci, Giorgio Giacinto, Fabio Roli
117
Voted
CASES
2005
ACM
15 years 3 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
DATE
2006
IEEE
87views Hardware» more  DATE 2006»
15 years 7 months ago
Thermal resilient bounded-skew clock tree optimization methodology
The existence of non-uniform thermal gradients on the substrate in high performance IC’s can significantly impact the performance of global on-chip interconnects. This issue is...
Ashutosh Chakraborty, Prassanna Sithambaram, Karth...
SACMAT
2005
ACM
15 years 7 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
CCS
2008
ACM
15 years 3 months ago
Improving the scalability of platform attestation
In the process of platform attestation, a Trusted Platform Module is a performance bottleneck, which causes enormous delays if multiple simultaneously attestation requests arrive ...
Frederic Stumpf, Andreas Fuchs, Stefan Katzenbeiss...