Sciweavers

2741 search results - page 500 / 549
» Designing Law-Compliant Software Requirements
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
ISCAS
2007
IEEE
141views Hardware» more  ISCAS 2007»
14 years 4 months ago
Analog Emulation of a Reconfigurable Tap Changing Transformer
—Accurate analog models of power system components are required in order to realize an analog computation engine for power systems. Analog computation is an area of continued int...
Aaron St. Leger, Juan C. Jimenez, Agung Fu, Sanal ...
ISORC
2007
IEEE
14 years 4 months ago
Data Dissemination for Wireless Sensor Networks
Due to the special characteristics (limited battery power, limited computing capability, low bandwidth, need to collect sensor data from multiple fixed-location source nodes to a...
Min-Gu Lee, Sunggu Lee
MSS
2007
IEEE
87views Hardware» more  MSS 2007»
14 years 4 months ago
TPT-RAID: a High Performance Box-Fault Tolerant Storage System
TPT-RAID is a multi-box RAID wherein each ECC group comprises at most one block Jrom any given storage box, and can thus tolerate a boxJailure. It extends the idea ojan out-oj-ban...
Yitzhak Birk, Erez Zilber
CIKM
2007
Springer
14 years 4 months ago
Optimizing parallel itineraries for knn query processing in wireless sensor networks
Spatial queries for extracting data from wireless sensor networks are important for many applications, such as environmental monitoring and military surveillance. One such query i...
Tao-Young Fu, Wen-Chih Peng, Wang-Chien Lee