Sciweavers

976 search results - page 47 / 196
» Evaluating Adversarial Partitions
Sort
View
APCSAC
2005
IEEE
14 years 3 months ago
An Integrated Partitioning and Scheduling Based Branch Decoupling
Conditional branch induced control hazards cause significant performance loss in modern out-of-order superscalar processors. Dynamic branch prediction techniques help alleviate th...
Pramod Ramarao, Akhilesh Tyagi
ICPR
2008
IEEE
14 years 11 months ago
Securing fingerprint template: Fuzzy vault with minutiae descriptors
Fuzzy vault has been shown to be an effective technique for securing fingerprint minutiae templates. Its security depends on the difficulty in identifying the set of genuine minut...
Abhishek Nagar, Anil K. Jain, Karthik Nandakumar
MMS
2002
13 years 9 months ago
Architectural considerations for next-generation file systems
Integration--supporting multiple application classes with heterogeneous requirements--is an emerging trend in networks, file systems, and operating systems. In this paper, we eval...
Prashant J. Shenoy, Pawan Goyal, Harrick M. Vin
PERCOM
2006
ACM
14 years 9 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
ALENEX
2008
180views Algorithms» more  ALENEX 2008»
13 years 11 months ago
Geometric Algorithms for Optimal Airspace Design and Air Traffic Controller Workload Balancing
The National Airspace System (NAS) is designed to accommodate a large number of flights over North America. For purposes of workload limitations for air traffic controllers, the a...
Amitabh Basu, Joseph S. B. Mitchell, Girishkumar S...