Sciweavers

666 search results - page 89 / 134
» A Persistent Hyper-Programming System
Sort
View
95
Voted
USS
2008
15 years 4 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
FLAIRS
2004
15 years 3 months ago
An Active Architecture for Managing Events in Pervasive Computing Environments
Many dramatizations have depicted a fully automated home living environment, where actions and events are understood or even anticipated. While the realization of such environment...
Edwin Wong, Lisa J. Burnell, Charles Hannon
CARS
2003
15 years 3 months ago
Image-guided otologic surgery
Otologic surgery is undertaken to treat ailments of the ear including persistent infections, hearing loss, vertigo, and cancer. Typically performed on healthy patients in outpatien...
Robert F. Labadie, Michael Fenlon, Hakan Cvikalp, ...
100
Voted
HASE
2008
IEEE
15 years 3 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
112
Voted
AUTOMATICA
2008
93views more  AUTOMATICA 2008»
15 years 2 months ago
An LFT approach to parameter estimation
In this paper we consider a unified framework for parameter estimation problems which arise in a system identification context. In this framework, the parameters to be estimated a...
Kenneth Hsu, Tyrone L. Vincent, Greg Wolodkin, Sun...