Sciweavers

666 search results - page 89 / 134
» A Persistent Hyper-Programming System
Sort
View
USS
2008
14 years 16 days ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
FLAIRS
2004
13 years 11 months ago
An Active Architecture for Managing Events in Pervasive Computing Environments
Many dramatizations have depicted a fully automated home living environment, where actions and events are understood or even anticipated. While the realization of such environment...
Edwin Wong, Lisa J. Burnell, Charles Hannon
CARS
2003
13 years 11 months ago
Image-guided otologic surgery
Otologic surgery is undertaken to treat ailments of the ear including persistent infections, hearing loss, vertigo, and cancer. Typically performed on healthy patients in outpatien...
Robert F. Labadie, Michael Fenlon, Hakan Cvikalp, ...
HASE
2008
IEEE
13 years 11 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
AUTOMATICA
2008
93views more  AUTOMATICA 2008»
13 years 10 months ago
An LFT approach to parameter estimation
In this paper we consider a unified framework for parameter estimation problems which arise in a system identification context. In this framework, the parameters to be estimated a...
Kenneth Hsu, Tyrone L. Vincent, Greg Wolodkin, Sun...