Sciweavers

1356 search results - page 92 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
INDIASE
2009
ACM
14 years 2 months ago
Computing dynamic clusters
When trying to reverse engineer software, execution trace analysis is increasingly used. Though, by using this technique we are quickly faced with an enormous amount of data that ...
Philippe Dugerdil, Sebastien Jossi
SAG
2004
Springer
14 years 1 months ago
A Proxy Service for the xrootd Data Server
In data intensive sciences like High Energy Physics, large amounts of data are typically distributed and/or replicated to several sites. Although there exist various ways to store...
Andrew Hanushevsky, Heinz Stockinger
SOUPS
2009
ACM
14 years 2 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
PERCOM
2007
ACM
14 years 8 months ago
Structural Learning of Activities from Sparse Datasets
Abstract. A major challenge in pervasive computing is to learn activity patterns, such as bathing and cleaning from sensor data. Typical sensor deployments generate sparse datasets...
Fahd Albinali, Nigel Davies, Adrian Friday
FPL
2003
Springer
114views Hardware» more  FPL 2003»
14 years 1 months ago
Power Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve en...
François-Xavier Standaert, Loïc van Ol...