Sciweavers

3686 search results - page 709 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
NIPS
1997
13 years 9 months ago
Computing with Action Potentials
Most computational engineering based loosely on biology uses continuous variables to represent neural activity. Yet most neurons communicate with action potentials. The engineerin...
John J. Hopfield, Carlos D. Brody, Sam T. Roweis
SSDBM
2005
IEEE
111views Database» more  SSDBM 2005»
14 years 1 months ago
Querying Streaming Geospatial Image Data: The GeoStreams Project
Data products generated from remotely-sensed, geospatial imagery (RSI) used in emerging areas, such as global climatology, environmental monitoring, land use, and disaster managem...
Quinn Hart, Michael Gertz
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 1 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
SIGSAND
2008
13 years 9 months ago
Reference Model for Service-oriented Business Software Based on Web Service Nets
Configurable business software solutions are increasingly being implemented based on service oriented architectures (SOA). Hereunto model driven approaches for the definition and i...
Maik Herfurth, Thomas Karle, Frank Schönthale...
EDBT
2006
ACM
143views Database» more  EDBT 2006»
14 years 7 months ago
XG: A Grid-Enabled Query Processing Engine
In [12] we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. In this demo we show how this architecture is le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Thom...