Sciweavers

2019 search results - page 61 / 404
» On detecting differences between groups
Sort
View
CIMCA
2005
IEEE
14 years 1 months ago
Access Control for Shared Resources
Access control for shared resources is a complex and challenging task, in particular if the access control policy should be able to cope with different kind of sharing and collabo...
Erik Wilde, Nick Nabholz
CHES
2004
Springer
148views Cryptology» more  CHES 2004»
14 years 1 months ago
Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
We present an implementation of elliptic curves and of hyperelliptic curves of genus 2 and 3 over prime fields. To achieve a fair comparison between the different types of groups,...
Roberto Maria Avanzi
RTSS
2005
IEEE
14 years 1 months ago
Trading End-to-End Latency for Composability
The periodic resource model for hierarchical, compositional scheduling abstracts task groups by resource requirements. We study this model in the presence of dataflow constraints...
Slobodan Matic, Thomas A. Henzinger
IJNSEC
2008
137views more  IJNSEC 2008»
13 years 7 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh
AVI
2010
13 years 9 months ago
Future development environments for computational scientists
Computational Scientists are both creators and end-users of scientific models. Different aspects to their work target different audiences and generally require different developme...
Andreas Heil, Matthew J. Smith, Alexander Brä...