Sciweavers

1141 search results - page 161 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
AFRICACRYPT
2009
Springer
15 years 11 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...
CCS
2010
ACM
15 years 4 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
BMCBI
2008
160views more  BMCBI 2008»
15 years 4 months ago
Predicting cancer involvement of genes from heterogeneous data
Background: Systematic approaches for identifying proteins involved in different types of cancer are needed. Experimental techniques such as microarrays are being used to characte...
Ramon Aragues, Chris Sander, Baldo Oliva
MICCAI
2007
Springer
16 years 5 months ago
High Throughput Analysis of Breast Cancer Specimens on the Grid
Breast cancer accounts for about 30% of all cancers and 15% of all cancer deaths in women in the United States. Advances in computer assisted diagnosis (CAD) holds promise for earl...
Lin Yang, Wenjin Chen, Peter Meer, Gratian Salaru,...
SOSP
2003
ACM
16 years 1 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz