Sciweavers

3295 search results - page 656 / 659
» Using Technologies to Improve E-Learning
Sort
View
IEEESP
2007
98views more  IEEESP 2007»
14 years 9 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
14 years 9 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
BMCBI
2005
169views more  BMCBI 2005»
14 years 9 months ago
An adaptive method for cDNA microarray normalization
Background: Normalization is a critical step in analysis of gene expression profiles. For duallabeled arrays, global normalization assumes that the majority of the genes on the ar...
Yingdong Zhao, Ming-Chung Li, Richard Simon
JSAC
2007
177views more  JSAC 2007»
14 years 9 months ago
Achieving Shared Protection for Dynamic Multicast Sessions in Survivable Mesh WDM Networks
— The advances in wavelength-division multiplexing (WDM) technology are expected to facilitate bandwidth-intensive multicast applications. A single fiber failure in such a netwo...
Hongbin Luo, Lemin Li, Hongfang Yu, Sheng Wang
TC
1998
14 years 9 months ago
Methodologies for Tolerating Cell and Interconnect Faults in FPGAs
—The very high levels of integration and submicron device sizes used in current and emerging VLSI technologies for FPGAs lead to higher occurrences of defects and operational fau...
Fran Hanchek, Shantanu Dutt