Sciweavers

7839 search results - page 295 / 1568
» What's there and what's not
Sort
View
IOLTS
2009
IEEE
124views Hardware» more  IOLTS 2009»
15 years 8 months ago
On-line characterization and reconfiguration for single event upset variations
The amount of physical variation among electronic components on a die is increasing rapidly. There is a need for a better understanding of variations in transient fault susceptibil...
Kenneth M. Zick, John P. Hayes
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
15 years 8 months ago
Enterprise Modeling for Information System Development within MDA
Object-oriented analysis suggests semiformal usecase driven techniques for problem domain modeling from a computation independent viewpoint. The proposed approach called Topologic...
Janis Osis, Erika Asnina
IEEEIAS
2008
IEEE
15 years 8 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
RSFDGRC
2007
Springer
124views Data Mining» more  RSFDGRC 2007»
15 years 8 months ago
Supporting Literature Exploration with Granular Knowledge Structures
Reading and literature exploration are important tasks of scientific research. However, conventional retrieval systems provide limited support for these tasks by concentrating on ...
Yiyu Yao, Yi Zeng, Ning Zhong
SP
2006
IEEE
15 years 7 months ago
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
Philippe Golle, XiaoFeng Wang, Markus Jakobsson, A...