Sciweavers

1058 search results - page 190 / 212
» Secure Group Communications Using Key Graphs
Sort
View
ASAP
2004
IEEE
119views Hardware» more  ASAP 2004»
15 years 1 months ago
Automatic Synthesis of Customized Local Memories for Multicluster Application Accelerators
Distributed local memories, or scratchpads, have been shown to effectively reduce cost and power consumption of application-specific accelerators while maintaining performance. Th...
Manjunath Kudlur, Kevin Fan, Michael L. Chu, Scott...
ISI
2006
Springer
14 years 9 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...
67
Voted
INFOCOM
2009
IEEE
15 years 4 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
CIDR
2009
181views Algorithms» more  CIDR 2009»
14 years 10 months ago
The Case for RodentStore: An Adaptive, Declarative Storage System
Recent excitement in the database community surrounding new applications--analytic, scientific, graph, geospatial, etc.--has led to an explosion in research on database storage sy...
Philippe Cudré-Mauroux, Eugene Wu, Samuel M...
68
Voted
CHI
2006
ACM
15 years 10 months ago
"Girls don't waste time": pre-adolescent attitudes toward ICT
Relying on naturalistic observation, via video selfdocumentaries, contextual interviews, and focus groups, we explored gender differences in the information and communication tech...
Weimin Hou, Manpreet Kaur, Anita Komlodi, Wayne G....