Sciweavers

14190 search results - page 2588 / 2838
» computing 2008
Sort
View
116
Voted
USS
2008
15 years 6 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
100
Voted
WSC
2008
15 years 6 months ago
How much is a health insurer willing to pay for Colorectal Cancer screening tests?
Colorectal Cancer (CRC) screening tests have proven to be cost-effective in preventing cancer incidence. Yet, as recent studies have shown, CRC screening tests are noticeably unde...
Reza Yaesoubi, Stephen D. Roberts
WSC
2008
15 years 6 months ago
Modeling and simulation of e-mail social networks: A new stochastic agent-based approach
Understanding how the structure of a network evolves over time is one of the most interesting and complex topics in the field of social networks. In our attempt to model the dynam...
Fabian Menges, Bud Mishra, Giuseppe Narzisi
WSC
2008
15 years 6 months ago
REal-time delay estimation in call centers
We use computer simulation to study the performance of alternative real-time delay estimators in heavily loaded multiserver queueing models. These delay estimates may be used to m...
Rouba Ibrahim, Ward Whitt
WSC
2008
15 years 6 months ago
Measuring the effectiveness of the s-metric to produce better network models
Recent research has shown that while many complex networks follow a power-law distribution for their node degrees, it is not sufficient to model these networks based only on their...
Isabel Beichl, Brian Cloteaux
« Prev « First page 2588 / 2838 Last » Next »