Sciweavers

2186 search results - page 117 / 438
» Considering an Organization's Memory
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
13 years 1 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
SIGMOD
2007
ACM
224views Database» more  SIGMOD 2007»
14 years 10 months ago
Design of flash-based DBMS: an in-page logging approach
The popularity of high-density flash memory as data storage media has increased steadily for a wide spectrum of computing devices such as PDA's, MP3 players, mobile phones an...
Sang-Won Lee, Bongki Moon
CORR
2008
Springer
103views Education» more  CORR 2008»
13 years 10 months ago
The Capacity Region of the Degraded Finite-State Broadcast Channel
We consider the discrete, time-varying broadcast channel with memory, under the assumption that the channel states belong to a set of nite cardinality. We begin with the de nition...
Ron Dabora, Andrea J. Goldsmith
CORR
2007
Springer
105views Education» more  CORR 2007»
13 years 10 months ago
On Real-Time Communication Systems with Noisy Feedback
— We consider a real--time communication system with noisy feedback consisting of a Markov source, a forward and a backward discrete memoryless channels, and a receiver with fin...
Aditya Mahajan, Demosthenis Teneketzis
ICSEA
2007
IEEE
14 years 4 months ago
The Knowledge Based Software Process Improvement Program: A Rational Analysis
Knowledge management is the key area of focus in the present information technology scenario. It forms a basis to derive standards and models and steers organizations through an e...
K. Alagarsamy, S. Justus, K. Iyakutti