Sciweavers

13651 search results - page 2513 / 2731
» Spectral analysis of data
Sort
View
136
Voted
ASPLOS
2000
ACM
15 years 9 months ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin
157
Voted
MICCAI
1999
Springer
15 years 9 months ago
Image Processing for Diffusion Tensor Magnetic Resonance Imaging
This paper1 describes image processing techniques for Diffusion Tensor Magnetic Resonance. In Diffusion Tensor MRI, a tensor describing local water diffusion is acquired for each v...
Carl-Fredrik Westin, S. E. Maier, B. Khidhir, Pete...
INFOCOM
1998
IEEE
15 years 9 months ago
Active Reliable Multicast
Abstract--This paper presents a novel loss recovery scheme, Active Reliable Multicast (ARM), for large-scale reliable multicast. ARM is "active" in that routers in the mu...
Li-Wei H. Lehman, Stephen J. Garland, David L. Ten...
RIDE
1998
IEEE
15 years 9 months ago
On Periodic Resource Scheduling for Continuous Media Databases
The Enhanced Pay-Per-View (EPPV) model for providing continuous-media services associates with each continuous-media clip a display frequency that depends on the clip's popula...
Minos N. Garofalakis, Banu Özden, Abraham Sil...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 9 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
« Prev « First page 2513 / 2731 Last » Next »