Sciweavers

744 search results - page 116 / 149
» Special issue on e-maintenance
Sort
View
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
MOBISYS
2008
ACM
15 years 2 months ago
MobiVMM: a virtual machine monitor for mobile phones
Mobile phones have evolved into complex systems as they have more and more new applications built-in. As a result, they are less reliable and less secure than before. Virtual Mach...
See-hwan Yoo, Yunxin Liu, Cheol-Ho Hong, Chuck Yoo...
WSC
2001
15 years 1 months ago
Satellite communications representation in network simulation
This paper presents methodologies to represent satellite communications (SATCOM) behaviors in network simulation. This paper is based on tasks performed for generic network warfar...
Kenneth Y. Jo
SIGCOMM
2010
ACM
15 years 20 hour ago
The case for active device drivers
We revisit the device-driver architecture supported by the majority of operating systems, where a driver is a passive object that does not have its own thread of control and is on...
Leonid Ryzhyk, Yanjin Zhu, Gernot Heiser
BMCBI
2008
228views more  BMCBI 2008»
14 years 12 months ago
Adaptive diffusion kernel learning from biological networks for protein function prediction
Background: Machine-learning tools have gained considerable attention during the last few years for analyzing biological networks for protein function prediction. Kernel methods a...
Liang Sun, Shuiwang Ji, Jieping Ye