Sciweavers

14649 search results - page 2878 / 2930
» Principles of problem solving
Sort
View
USENIX
2004
13 years 10 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
LISA
2003
13 years 10 months ago
Using Service Grammar to Diagnose BGP Configuration Errors
Often network components work correctly, yet end-to-end services don’t. This happens if configuration parameters of components are set to incorrect values. Configuration is a fu...
Xiaohu Qie, Sanjai Narain
PICS
2003
13 years 10 months ago
Selection of Training Sets for the Characterisation of Multispectral Imaging Systems
To establish a correlation between the system output and the corresponding reflectance, the system characterisation functionDeriving the actual multispectral data from the output o...
Paolo Pellegri, Gianluca Novati, Raimondo Schettin...
VISSYM
2003
13 years 10 months ago
Visual Hierarchical Dimension Reduction for Exploration of High Dimensional Datasets
Traditional visualization techniques for multidimensional data sets, such as parallel coordinates, glyphs, and scatterplot matrices, do not scale well to high numbers of dimension...
Jing Yang, Matthew O. Ward, Elke A. Rundensteiner,...
ICISC
2000
126views Cryptology» more  ICISC 2000»
13 years 10 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
« Prev « First page 2878 / 2930 Last » Next »