Sciweavers

976 search results - page 47 / 196
» Evaluating Adversarial Partitions
Sort
View
136
Voted
APCSAC
2005
IEEE
15 years 9 months ago
An Integrated Partitioning and Scheduling Based Branch Decoupling
Conditional branch induced control hazards cause significant performance loss in modern out-of-order superscalar processors. Dynamic branch prediction techniques help alleviate th...
Pramod Ramarao, Akhilesh Tyagi
133
Voted
ICPR
2008
IEEE
16 years 4 months ago
Securing fingerprint template: Fuzzy vault with minutiae descriptors
Fuzzy vault has been shown to be an effective technique for securing fingerprint minutiae templates. Its security depends on the difficulty in identifying the set of genuine minut...
Abhishek Nagar, Anil K. Jain, Karthik Nandakumar
141
Voted
MMS
2002
15 years 3 months ago
Architectural considerations for next-generation file systems
Integration--supporting multiple application classes with heterogeneous requirements--is an emerging trend in networks, file systems, and operating systems. In this paper, we eval...
Prashant J. Shenoy, Pawan Goyal, Harrick M. Vin
152
Voted
PERCOM
2006
ACM
16 years 3 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
148
Voted
ALENEX
2008
180views Algorithms» more  ALENEX 2008»
15 years 5 months ago
Geometric Algorithms for Optimal Airspace Design and Air Traffic Controller Workload Balancing
The National Airspace System (NAS) is designed to accommodate a large number of flights over North America. For purposes of workload limitations for air traffic controllers, the a...
Amitabh Basu, Joseph S. B. Mitchell, Girishkumar S...