Sciweavers

557 search results - page 67 / 112
» Two experiences designing for effective security
Sort
View
BIBE
2006
IEEE
132views Bioinformatics» more  BIBE 2006»
15 years 6 months ago
Simplicity in RNA Secondary Structure Alignment: Towards biologically plausible alignments
Ribonucleic acid (RNA) molecules contain the genetic information that regulates the functions of organisms. Given two different molecules, a preserved function corresponds to a pr...
Rimon Mikhaiel, Guohui Lin, Eleni Stroulia
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
15 years 8 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
ATAL
2009
Springer
15 years 6 months ago
Smart cheaters do prosper: defeating trust and reputation systems
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of...
Reid Kerr, Robin Cohen
AINA
2008
IEEE
15 years 6 months ago
Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems
—With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network Intrusion Detection System (NIDS) is develop...
Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su
ISI
2004
Springer
15 years 5 months ago
Spatial Forecast Methods for Terrorist Events in Urban Environments
Abstract. Terrorist events such as suicide bombings are rare yet extremely destructive events. Responses to such events are even rarer, because they require forecasting methods for...
Donald Brown, Jason Dalton, Heidi Hoyle