Sciweavers

1532 search results - page 120 / 307
» An analysis of additivity in OLAP systems
Sort
View
DKE
2007
99views more  DKE 2007»
13 years 9 months ago
Interaction pattern detection in process oriented information systems
Finding interaction patterns is a challenging problem, but this kind of information about processes or social networks might be useful for an organization’s management to unders...
Schahram Dustdar, Thomas Hoffmann
ICCCN
2007
IEEE
14 years 3 months ago
On Short Forward Error-Correcting Codes for Wireless Communication Systems
—For real-time wireless communications, short forward error-correcting (FEC) codes are indispensable due to the strict delay requirement. In this paper we study the performance o...
Sheng Tong, Dengsheng Lin, Aleksandar Kavcic, Baom...
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
14 years 1 months ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart
ACSAC
2004
IEEE
14 years 28 days ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
JSAC
2008
112views more  JSAC 2008»
13 years 9 months ago
System Design Considerations for Undersea Networks: Link and Multiple Access Protocols
Abstract--We address several inter-related aspects of underwater network design within the context of a cross-layer approach. We first highlight the impact of key characteristics o...
Nathan Parrish, Leonard T. Tracy, Sumit Roy, Payma...