Sciweavers

1994 search results - page 196 / 399
» Limited Software Warranties
Sort
View
ESORICS
2008
Springer
14 years 12 days ago
CPU Bugs, CPU Backdoors and Consequences on Security
In this paper, we present the security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors. We will not try to determine whether the b...
Loïc Duflot
BILDMED
2008
129views Algorithms» more  BILDMED 2008»
14 years 2 days ago
Evaluating the Performance of Processing Medical Volume Data on Graphics Hardware
With the broad availability and increasing performance of commodity graphics processors (GPU), non-graphical applications have become an active field of research. However, leveragi...
Matthias Raspe, Guido Lorenz, Stefan Müller 0...
CSREAESA
2007
14 years 2 days ago
IT Security Protection at Field Level of Industrial Automation Systems
—Current industrial automation systems are virtually unprotected against attacks on IT security at field level, especially if an attacker is able to connect physically to field...
Felix Gutbrodt
LREC
2008
144views Education» more  LREC 2008»
14 years 2 days ago
Linguistic Resources and Evaluation Techniques for Evaluation of Cross-Document Automatic Content Extraction
The NIST Automatic Content Extraction (ACE) Evaluation expands its focus in 2008 to encompass the challenge of cross-document and cross-language global integration and reconciliat...
Stephanie Strassel, Mark A. Przybocki, Kay Peterso...
WALTD
2008
168views Education» more  WALTD 2008»
14 years 1 days ago
Accessible Interfaces for Educational Multimedia Contents
The use of technology is growing in every field of education, and not only in the education of disabled students but also as a learning resource for everybody. The teachers are mo...
Lourdes Moreno, Ana Iglesias, Paloma Martín...