Sciweavers

416 search results - page 30 / 84
» Some new approaches for preventing software tampering
Sort
View
SOCO
2010
Springer
14 years 10 months ago
Automatic detection of trends in time-stamped sequences: an evolutionary approach
This paper presents an evolutionary algorithm for modeling the arrival dates in time-stamped data sequences such as newscasts, e-mails, IRC conversations, scientific journal artic...
Lourdes Araujo, Juan Julián Merelo Guerv&oa...
ISCA
2012
IEEE
212views Hardware» more  ISCA 2012»
13 years 2 months ago
TimeWarp: Rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on ...
Robert Martin, John Demme, Simha Sethumadhavan
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
15 years 6 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
DS
1997
117views Database» more  DS 1997»
15 years 1 months ago
Experience with a Combined Approach to Attribute-Matching Across Heterogeneous Databases
Determining attribute correspondences is a difficult, time-consuming, knowledge-intensive part of database integration. We report on experiences with tools that identified candi...
Chris Clifton, E. Housman, Arnon Rosenthal
TSMC
2010
14 years 6 months ago
On Robust Stability of Stochastic Genetic Regulatory Networks With Time Delays: A Delay Fractioning Approach
Robust stability serves as an important regulation mechanism in system biology and synthetic biology. In this paper, the robust stability analysis problem is investigated for a cla...
Yao Wang, Zidong Wang, Jinling Liang