Sciweavers

832 search results - page 82 / 167
» Effect of Malicious Synchronization
Sort
View
NIPS
2008
13 years 11 months ago
Estimating the Location and Orientation of Complex, Correlated Neural Activity using MEG
The synchronous brain activity measured via MEG (or EEG) can be interpreted as arising from a collection (possibly large) of current dipoles or sources located throughout the cort...
David P. Wipf, Julia Owen, Hagai Attias, Kensuke S...
PE
2008
Springer
143views Optimization» more  PE 2008»
13 years 10 months ago
Improving the performance of large interconnection networks using congestion-control mechanisms
As the size of parallel computers increases, as well as the number of sources per router node, congestion inside the interconnection network rises significantly. In such systems, ...
José Miguel-Alonso, Cruz Izu, José-&...
PVLDB
2010
138views more  PVLDB 2010»
13 years 8 months ago
The Case for Determinism in Database Systems
Replication is a widely used method for achieving high availability in database systems. Due to the nondeterminism inherent in traditional concurrency control schemes, however, sp...
Alexander Thomson, Daniel J. Abadi
CHI
2006
ACM
14 years 10 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
PERCOM
2005
ACM
14 years 9 months ago
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
Pervasive computing is a future technology that provides a user with the capability to compute and communicate from everywhere. In a pervasive computing environment, a user interac...
Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, ...