Sciweavers

6907 search results - page 221 / 1382
» Securing distributed adaptation
Sort
View
ACSAC
2002
IEEE
15 years 9 months ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
ICCAD
2009
IEEE
152views Hardware» more  ICCAD 2009»
15 years 1 months ago
Adaptive sampling for efficient failure probability analysis of SRAM cells
In this paper, an adaptive sampling method is proposed for the statistical SRAM cell analysis. The method is composed of two components. One part is the adaptive sampler that manip...
Javid Jaffari, Mohab Anis
NRHM
1998
124views more  NRHM 1998»
15 years 3 months ago
Adaptable and adaptive information provision for all users, including disabled and elderly people
: Due to the tremendously increasing popularity of the World-Wide Web, hypermedia is going to be the leading online information medium for some years to come and will most likely b...
Josef Fink, Alfred Kobsa, Andreas Nill
139
Voted
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 9 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
129
Voted
CCGRID
2008
IEEE
15 years 10 months ago
A Performance Study of Secure Data Mining on the Cell Processor
— This paper examines the potential of the Cell processor as a platform for secure data mining on the future volunteer computing systems. Volunteer computing platforms have the p...
Hong Wang 0006, Hiroyuki Takizawa, Hiroaki Kobayas...