Sciweavers

12183 search results - page 53 / 2437
» Computers under Attacks!
Sort
View
HICSS
2007
IEEE
138views Biometrics» more  HICSS 2007»
14 years 4 months ago
A Probabilistic Graphical Approach to Computing Electricity Price Duration Curves under Price and Quantity Competition
Abstract— The electricity price duration curve (EPDC) represents the probability distribution function of the electricity price considered as a random variable. The price uncerta...
Pascal Michaillat, Shmuel S. Oren
ICDT
2012
ACM
251views Database» more  ICDT 2012»
12 years 10 days ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
CVPR
2010
IEEE
14 years 6 months ago
Visual Recognition and Detection Under Bounded Computational Resources
Visual recognition and detection are computationally intensive tasks and current research efforts primarily focus on solving them without considering the computational capability ...
Sudheendra Vijayanarasimhan, Ashish Kapoor
WIAS
2010
102views more  WIAS 2010»
13 years 8 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
CCS
2008
ACM
13 years 12 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...