Sciweavers

631 search results - page 91 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
DATE
2010
IEEE
121views Hardware» more  DATE 2010»
15 years 6 months ago
Properties of and improvements to time-domain dynamic thermal analysis algorithms
—Temperature has a strong influence on integrated circuit (IC) performance, power consumption, and reliability. However, accurate thermal analysis can impose high computation co...
Xi Chen, Robert P. Dick, Li Shang
MSR
2010
ACM
15 years 6 months ago
Identifying licensing of jar archives using a code-search approach
—Free and open source software strongly promotes the reuse of source code. Some open source Java components/libraries are distributed as jar archives only containing the bytecode...
Massimiliano Di Penta, Daniel M. Germán, Gi...
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 6 months ago
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet
A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care...
David W. Chadwick, Carmen Carroll, S. Harvey, John...
NEUROSCIENCE
2001
Springer
15 years 6 months ago
Neural Mechanisms for Representing Surface and Contour Features
Contours and surfaces are basic qualities which are processed by the visual system to aid the successful behavior of autonomous beings within the environment. There is increasing e...
Thorsten Hansen, Heiko Neumann
SIGMOD
2000
ACM
141views Database» more  SIGMOD 2000»
15 years 6 months ago
Counting, Enumerating, and Sampling of Execution Plans in a Cost-Based Query Optimizer
Testing an SQL database system by running large sets of deterministic or stochastic SQL statements is common practice in commercial database development. However, code defects oft...
Florian Waas, César A. Galindo-Legaria