Sciweavers

1042 search results - page 134 / 209
» Representing real numbers in a generalized numeration system
Sort
View
FC
2010
Springer
135views Cryptology» more  FC 2010»
15 years 5 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
MEDINFO
2007
129views Healthcare» more  MEDINFO 2007»
15 years 2 months ago
Confidentiality Preserving Audits of Electronic Medical Record Access
Failure to supply a care provider with timely access to a patient's medical record can lead to patient harm or death. As such, healthcare organizations often endow care provi...
Bradley Malin, Edoardo Airoldi
LCTRTS
2010
Springer
14 years 11 months ago
RNFTL: a reuse-aware NAND flash translation layer for flash memory
In this paper, we propose a hybrid-level flash translation layer (FTL) called RNFTL (Reuse-Aware NFTL) to improve the endurance and space utilization of NAND flash memory. Our bas...
Yi Wang, Duo Liu, Meng Wang, Zhiwei Qin, Zili Shao...
ICCV
2003
IEEE
16 years 3 months ago
Using Temporal Coherence to Build Models of Animals
This paper describes a system that can build appearance models of animals automatically from a video sequence of the relevant animal with no explicit supervisory information. The ...
Deva Ramanan, David A. Forsyth
JTRES
2009
ACM
15 years 8 months ago
Avoiding unbounded priority inversion in barrier protocols using gang priority management
Large real-time software systems such as real-time Java virtual machines often use barrier protocols, which work for a dynamically varying number of threads without using centrali...
Harald Röck, Joshua S. Auerbach, Christoph M....