Sciweavers

4118 search results - page 781 / 824
» Mechanisms for usage control
Sort
View
WS
2006
ACM
14 years 4 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
APCSAC
2005
IEEE
14 years 4 months ago
An Integrated Partitioning and Scheduling Based Branch Decoupling
Conditional branch induced control hazards cause significant performance loss in modern out-of-order superscalar processors. Dynamic branch prediction techniques help alleviate th...
Pramod Ramarao, Akhilesh Tyagi
CSB
2005
IEEE
119views Bioinformatics» more  CSB 2005»
14 years 4 months ago
Temperature and Mutation Switches in the Secondary Structure of Small RNAs
Conformational switching in the secondary structure of RNAs has recently attracted considerable attention, fostered by the discovery of ‘riboswitches’ in living organisms. The...
Assaf Avihoo, Danny Barash
CSB
2005
IEEE
168views Bioinformatics» more  CSB 2005»
14 years 4 months ago
cis-Regulatory Element Prediction in Mammalian Genomes
The identification of cis-regulatory elements and modules is an important step in understanding the regulation of genes. We have developed a pipeline capable of running multiple m...
Asim S. Siddiqui, Gordon Robertson, Misha Bilenky,...
ICAC
2005
IEEE
14 years 4 months ago
Feedback-based Scheduling for Back-end Databases in Shared Dynamic Content Server Clusters
This paper introduces a self-configuring architecture for scaling the database tier of dynamic content web servers. We use a unified approach to load and fault management based ...
Gokul Soundararajan, Kaloian Manassiev, Jin Chen, ...