Sciweavers

987 search results - page 54 / 198
» Key Characteristics of Hymns
Sort
View
VLDB
2003
ACM
156views Database» more  VLDB 2003»
14 years 7 months ago
Watermarking relational data: framework, algorithms and analysis
We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and de...
Rakesh Agrawal, Peter J. Haas, Jerry Kiernan
HIPEAC
2009
Springer
14 years 2 months ago
Finding Stress Patterns in Microprocessor Workloads
Power consumption has emerged as a key design concern across the entire computing range, from low-end embedded systems to high-end supercomputers. Understanding the power character...
Frederik Vandeputte, Lieven Eeckhout
ICC
2008
IEEE
123views Communications» more  ICC 2008»
14 years 2 months ago
A Physical-Layer Technique to Enhance Authentication for Mobile Terminals
Abstract— We propose an enhanced physical-layer authentication scheme for multi-carrier wireless systems, where transmission bursts consist of multiple frames. More specifically...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
HICSS
2006
IEEE
144views Biometrics» more  HICSS 2006»
14 years 1 months ago
Knowledge Transfer: Short-Circuiting the Learning Cycle?
Knowledge is considered to be a key organizational resource in the 21st century and the knowledge management ‘movement’ has alerted organizations to the fact that they should ...
Sue Newell, Robert D. Galliers
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das