Sciweavers

505 search results - page 32 / 101
» Message from General Co-Chairs
Sort
View
SOSP
1993
ACM
13 years 11 months ago
Improving IPC by Kernel Design
Inter-process communication (ipc) has to be fast and e ective, otherwise programmers will not use remote procedure calls(RPC),multithreadingand multitasking adequately. Thus ipc p...
Jochen Liedtke
ISCAS
2006
IEEE
155views Hardware» more  ISCAS 2006»
14 years 4 months ago
Design and evaluation of steganography for voice-over-IP
—According to former results from [1] in this paper we summarize the design principles from the general approach and introduce extended experimental test results of a Voice-over-...
Christian Krätzer, Jana Dittmann, Thomas Voge...
APSEC
2006
IEEE
14 years 4 months ago
Project Replayer with Email Analysis - Revealing Contexts in Software Development
In many software development projects, people tend to repeat same mistakes due to lack of shared knowledge from past experiences. Generally, it is very difficult to manually find ...
Kimiharu Okura, Keita Goto, Noriko Hanakawa, Shinj...
CSFW
1998
IEEE
14 years 2 months ago
Honest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
13 years 11 months ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu