Sciweavers

1532 search results - page 249 / 307
» An analysis of additivity in OLAP systems
Sort
View
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
13 years 6 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 5 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
ADC
2010
Springer
210views Database» more  ADC 2010»
13 years 4 months ago
Towards unifying advances in twig join algorithms
Twig joins are key building blocks in current XML indexing systems, and numerous algorithms and useful data structures have been introduced. We give a structured, qualitative anal...
Nils Grimsmo, Truls Amundsen Bjørklund
SIMULATION
2011
13 years 4 months ago
Note on 'Influences of Resource Limitations and Transmission Costs on Epidemic Simulations and Critical Thresholds in Scale-Free
In a recent paper entitled ‘Influences of Resource Limitations and Transmission Costs on Epidemic Simulations and Critical Thresholds in Scale-Free Networks’ by Huang et al., ...
James R. Wilson
VLUDS
2010
225views Visualization» more  VLUDS 2010»
13 years 3 months ago
Visualization in Human-Centered Virtual Factories
In a manufacturing system (MS), a wide range of human activities are applied in production processes. The human factor plays a core role and should be incorporated into the design...
Xiang Yang, Eduard Deines, Jan C. Aurich