Sciweavers

916 search results - page 144 / 184
» Using redundancies to find errors
Sort
View
USS
2008
15 years 1 days ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
CRIWG
2004
14 years 11 months ago
Empirical Evaluation of Collaborative Support for Distributed Pair Programming
Pair programming is an Extreme Programming (XP) practice where two programmers work on a single computer to produce an artifact. Empirical evaluations have provided evidence that t...
Jesús Favela, Hiroshi Natsu, Cynthia B. P&e...
IMAGING
2003
14 years 11 months ago
Influence of Spectral Sensitivity Functions on Color Demosaicing
Color images acquired through single chip digital cameras using a color filter array (CFA) contain a mixture of luminance and opponent chromatic information that share their repre...
David Alleysson, Sabine Süsstrunk, Joanna Mar...
FAC
2008
80views more  FAC 2008»
14 years 9 months ago
Verification of Mondex electronic purses with KIV: from transactions to a security protocol
The Mondex case study about the specification and refinement of an electronic purse as defined in the Oxford Technical Monograph PRG-126 has recently been proposed as a challenge f...
Dominik Haneberg, Gerhard Schellhorn, Holger Grand...
EOR
2006
73views more  EOR 2006»
14 years 9 months ago
Path relinking and GRG for artificial neural networks
Artificial neural networks (ANN) have been widely used for both classification and prediction. This paper is focused on the prediction problem in which an unknown function is appr...
Abdellah El-Fallahi, Rafael Martí, Leon S. ...