Sciweavers

6770 search results - page 142 / 1354
» How GPUs Work
Sort
View
RAID
1999
Springer
15 years 6 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier
CHI
1996
ACM
15 years 6 months ago
When Using the Tool Interferes with Doing the Task
How much time the user spends working on a task versus fiddling with the tool is an important aspect of usability. The concept of the ratio and distribution of tool-only operation...
Susan S. Kirschenbaum, Wayne D. Gray, Brian D. Ehr...
EH
2004
IEEE
118views Hardware» more  EH 2004»
15 years 6 months ago
Exploring Knowledge Schemes for Efficient Evolution of Hardware
There exist several approaches to improve the quality of evolution. In this paper, a priori design knowledge as a part of evolving systems is discussed. Further, experiments are r...
Jim Torresen
102
Voted
TRECVID
2008
15 years 3 months ago
BBC rush summarization and High-Level Feature extraction In TRECVID2008
In this paper, first we describe rushes summarization system which is made this year for the TRECVID2008 BBC rushes task. Our aim this year is to build up base system using minimu...
Ken Ishihara, Yuuta Sakai
114
Voted
ACSW
2006
15 years 3 months ago
Logcrypt: forward security and public verification for secure audit logs
Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
Jason E. Holt