Sciweavers

4306 search results - page 832 / 862
» Timed Testing with TorX
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
BMEI
2008
IEEE
15 years 4 months ago
Development of Epicardial Mapping System for Studying Atrial Fibrillation
Epicardial mapping system is an important tool for studying electrophysiological characteristics of atrial fibrillation (AF). AF is the most common arrhythmia and is becoming more...
Cuiwei Yang, Weijia Lu, Tuo Zhou, Xiaomei Wu, Zuxi...
79
Voted
IAT
2008
IEEE
15 years 4 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
92
Voted
ICDCS
2008
IEEE
15 years 4 months ago
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems
The multi-level storage architecture has been widely adopted in servers and data centers. However, while prefetching has been shown as a crucial technique to exploit the sequentia...
Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zho...
87
Voted
INFOCOM
2008
IEEE
15 years 4 months ago
Stability and Delay Bounds in Heterogeneous Networks of Aggregate Schedulers
—Aggregate scheduling is one of the most promising solutions to the issue of scalability in networks, like DiffServ networks and high speed switches, where hard QoS guarantees ar...
Gianluca Rizzo, Jean-Yves Le Boudec