Sciweavers

867 search results - page 134 / 174
» SQL Server 2005
Sort
View
121
Voted
RTCSA
2005
IEEE
15 years 8 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda
117
Voted
SAINT
2005
IEEE
15 years 8 months ago
Trace System of iSCSI Storage Access
In this paper, an IP-SAN access trace method is proposed and its implementation is presented. IP-SAN and iSCSI are expected to remedy problems of Fibre Channel (FC)-based SAN. Bec...
Saneyasu Yamaguchi, Masato Oguchi, Masaru Kitsureg...
TRIDENTCOM
2005
IEEE
15 years 8 months ago
A Geography-Aware Scalable Community Wireless Network Test Bed
Wireless mesh networks have increasingly become an object of interest in recent years as a strong alternative to purely wired infrastructure networks and purely mobile wireless ne...
Bow-Nan Cheng, Shivkumar Kalyanaraman, Max Klein
WECWIS
2005
IEEE
137views ECommerce» more  WECWIS 2005»
15 years 8 months ago
Using Singular Value Decomposition Approximation for Collaborative Filtering
Singular Value Decomposition (SVD), together with the Expectation-Maximization (EM) procedure, can be used to find a low-dimension model that maximizes the loglikelihood of obser...
Sheng Zhang, Weihong Wang, James Ford, Fillia Make...
WETICE
2005
IEEE
15 years 8 months ago
Application of Lightweight Formal Methods to Software Security
Formal specification and verification of security has proven a challenging task. There is no single method that has proven feasible. Instead, an integrated approach which combines...
David P. Gilliam, John D. Powell, Matt Bishop