Sciweavers

69 search results - page 10 / 14
» Computational Vulnerability Analysis for Information Surviva...
Sort
View
DAC
2007
ACM
13 years 11 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
HICSS
2002
IEEE
127views Biometrics» more  HICSS 2002»
14 years 12 days ago
What Does It Mean for an Organisation to Be Intelligent? Measuring Intellectual Bandwidth for Value Creation
The importance of electronic collaboration has risen as successful organisations recognize that they need to convert their intellectual resources into goods and services their cus...
Sajda Qureshi, Andries van der Vaart, Gijs Kauling...
CIVR
2007
Springer
195views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Towards optimal bag-of-features for object categorization and semantic video retrieval
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as ...
Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang 0003
IPPS
2002
IEEE
14 years 11 days ago
FARM: A Feedback-Based Adaptive Resource Management for Autonomous Hot-Spot Convergence System
Abstract— In this paper, we present a novel and comprehensive resource management solution for the autonomous hot-spot convergence system (AHSCS) that uses sensor web. This solut...
S. Swaminathan, G. Manimaran
FOCS
1994
IEEE
13 years 11 months ago
The Load, Capacity and Availability of Quorum Systems
A quorum system is a collection of sets (quorums) every two of which intersect. Quorum systems have been used for many applications in the area of distributed systems, including mu...
Moni Naor, Avishai Wool