Sciweavers

18094 search results - page 3544 / 3619
» The Architecture of Secure Systems
Sort
View
MOBICOM
2012
ACM
13 years 1 months ago
MIDU: enabling MIMO full duplex
Given that full duplex (FD) and MIMO both employ multiple antenna resources, an important question that arises is how to make the choice between MIMO and FD? We show that optimal ...
Ehsan Aryafar, Mohammad Ali Khojastepour, Karthike...
SIGMOD
2012
ACM
234views Database» more  SIGMOD 2012»
13 years 1 months ago
Oracle in-database hadoop: when mapreduce meets RDBMS
Big data is the tar sands of the data world: vast reserves of raw gritty data whose valuable information content can only be extracted at great cost. MapReduce is a popular parall...
Xueyuan Su, Garret Swart
IMC
2006
ACM
15 years 5 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
GI
2003
Springer
15 years 4 months ago
IT-Sicherheit durch konsequente Aggregation von Analysewerkzeugen
: Bis heute wird die Sicherheit bei der Entwicklung von IT-Systemen eher stiefmütterlich behandelt. Die Hauptursache hierfür liegt in extrem kurzen Innovationszyklen: Unternehmen...
Thomas Schwenkler, Stephan Groß, Kai Simon
CBMS
2004
IEEE
15 years 3 months ago
Online Medical Teaching Case Database
Page >> Table of Contents >> Abstract 17th IEEE Symposium on Computer-Based Medical Systems (CBMS'04) p. 420 Online Medical Teaching Case Database Susan Kansagra, ...
Susan Kansagra, Chris Chang, Saleem Hussain, Grego...
« Prev « First page 3544 / 3619 Last » Next »