Sciweavers

1211 search results - page 194 / 243
» Topics in 0--1 data
Sort
View
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
15 years 3 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
GLOBECOM
2009
IEEE
15 years 3 months ago
Optimization of Energy Efficient Transmission in Underwater Sensor Networks
Underwater communication is a challenging topic due to its singular channel characteristics. Most protocols used in terrestrial wireless communication can not be directly applied i...
Hongkun Yang, Bin Liu, Fengyuan Ren, Hao Wen, Chua...
DAS
2006
Springer
15 years 3 months ago
Toward File Consolidation by Document Categorization
An efficient adaptive document classification and categorization approach is proposed for personal file creation corresponding to user's specific needs and profile. This kind ...
Abdel Belaïd, André Alusse
EMSOFT
2006
Springer
15 years 3 months ago
Mixing signals and modes in synchronous data-flow systems
Synchronous data-flow languages such as Scade/Lustre manage infinite sequences, or streams, as primitive values making them naturally adapted to the description of datadominated s...
Jean-Louis Colaço, Grégoire Hamon, M...
EUC
2006
Springer
15 years 3 months ago
Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems
Even though its advantages such as non-volatility, fast write access time and solid-state shock resistance, NAND flash memory suffers from out-place-update, limited erase cycles, a...
Song-Hwa Park, Tae-Hoon Kim, Tae-Hoon Lee, Ki-Dong...