Sciweavers

192 search results - page 30 / 39
» An autonomous explore exploit strategy
Sort
View
CCS
2007
ACM
14 years 29 days ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
EH
2004
IEEE
117views Hardware» more  EH 2004»
14 years 21 days ago
Multi-objective Optimization of a Parameterized VLIW Architecture
The use of Application Specific Instruction-set Processors (ASIP) in embedded systems is a solution to the problem of increasing complexity in the functions these systems have to ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
AOIS
2004
13 years 10 months ago
Market-Based Recommender Systems: Learning Users' Interests by Quality Classification
Recommender systems are widely used to cope with the problem of information overload and, consequently, many recommendation methods have been developed. However, no one technique i...
Yan Zheng Wei, Luc Moreau, Nicholas R. Jennings
CORR
2008
Springer
78views Education» more  CORR 2008»
13 years 8 months ago
Wireless Secrecy in Cellular Systems with Infrastructure--Aided Cooperation
In cellular systems, confidentiality of uplink transmission with respect to eavesdropping terminals can be ensured by creating intentional interference via scheduling of concurren...
Petar Popovski, Osvaldo Simeone
TKDE
2002
148views more  TKDE 2002»
13 years 8 months ago
Parallel Star Join + DataIndexes: Efficient Query Processing in Data Warehouses and OLAP
On-Line Analytical Processing (OLAP) refers to the technologies that allow users to efficiently retrieve data from the data warehouse for decision-support purposes. Data warehouses...
Anindya Datta, Debra E. VanderMeer, Krithi Ramamri...