Sciweavers

39039 search results - page 7718 / 7808
» Implementation of the
Sort
View
IJMTM
2010
137views more  IJMTM 2010»
13 years 6 months ago
Entry-level engineering professionals and Product Lifecycle Management: a competency model
: In today's rapidly evolving global marketplace, jobs are continually being redefined due to technological innovations and a host of other factors. Workers are also being cal...
Sharron A. Frillman, Kari L. Wilde, Jonathan F. Ko...
INFOCOM
2010
IEEE
13 years 6 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
13 years 6 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...
IPPS
2010
IEEE
13 years 6 months ago
Designing high-performance and resilient message passing on InfiniBand
Abstract--Clusters featuring the InfiniBand interconnect are continuing to scale. As an example, the "Ranger" system at the Texas Advanced Computing Center (TACC) include...
Matthew J. Koop, Pavel Shamis, Ishai Rabinovitz, D...
ACSAC
2010
IEEE
13 years 5 months ago
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Heap spraying is an attack technique commonly used in hijacking browsers to download and execute malicious code. In this attack, attackers first fill a large portion of the victim...
Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei ...
« Prev « First page 7718 / 7808 Last » Next »