Sciweavers

2913 search results - page 318 / 583
» How Much to Copy
Sort
View
IEEEARES
2009
IEEE
15 years 1 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek
JSAC
2011
159views more  JSAC 2011»
14 years 10 months ago
An Anti-Jamming Stochastic Game for Cognitive Radio Networks
—Various spectrum management schemes have been proposed in recent years to improve the spectrum utilization in cognitive radio networks. However, few of them have considered the ...
Beibei Wang, Yongle Wu, K. J. Ray Liu, T. Charles ...
DATE
2011
IEEE
235views Hardware» more  DATE 2011»
14 years 7 months ago
An Overview of Approaches Towards the Timing Analysability of Parallel Architecture
In order to meet performance/low energy/integration requirements, parallel architectures (multithreaded cores and multi-cores) are more and more considered in the design of embedd...
Christine Rochange
CHI
2011
ACM
14 years 7 months ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...
IACR
2011
82views more  IACR 2011»
14 years 3 months ago
Wild McEliece Incognito
The wild McEliece cryptosystem uses wild Goppa codes over finite fields to achieve smaller public key sizes compared to the original McEliece cryptosystem at the same level of se...
Daniel J. Bernstein, Tanja Lange, Christiane Peter...