Sciweavers

524 search results - page 55 / 105
» Why phishing works
Sort
View
COMSWARE
2006
IEEE
15 years 5 months ago
Remote storage for mobile devices
— The ability to access remote file storage from mobile devices enables a number of new use cases for storing and sharing data. We describe the design and implementation of a Rem...
Jarkko Tolvanen, Tapio Suihko, Jaakko Lipasti, N. ...
ISCAS
2006
IEEE
93views Hardware» more  ISCAS 2006»
15 years 5 months ago
A low-power clock frequency multiplier
A low-power output feedback controlled frequency synthesizer. Our proposed circuit can be used for low-power multiplier is proposed for Delay Locked Loop (DLL) based application an...
Md. Ibrahim Faisal, Magdy A. Bayoumi, Peiyi Zhao
NSPW
2006
ACM
15 years 5 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
SAS
2004
Springer
15 years 5 months ago
Program Generators and the Tools to Make Them
Program generation is among the most promising techniques in the effort to increase the automation of programming tasks. In this paper, we discuss the potential impact and resear...
Yannis Smaragdakis
CAISE
2001
Springer
15 years 4 months ago
Objects Control for Software Configuration Management
A major requirement in Software Engineering is to reduce the time to market. This requirement along with a demand for product sophistication and better quality has led to larger te...
Jacky Estublier