Sciweavers

94 search results - page 16 / 19
» Principles of remote attestation
Sort
View
IJKESDP
2010
94views more  IJKESDP 2010»
13 years 2 months ago
Neuro-fuzzy-combiner: an effective multiple classifier system
: A neuro-fuzzy-combiner (NFC) is proposed to design an efficient multiple classifier system (MCS) with an aim to have an effective solution scheme for difficult classification pro...
Ashish Ghosh, B. Uma Shankar, Lorenzo Bruzzone, Sa...
PAM
2011
Springer
12 years 10 months ago
FACT: Flow-Based Approach for Connectivity Tracking
More than 20 years after the launch of the public Internet, operator forums are still full of reports about temporary unreachability of complete networks. We propose FACT, a system...
Dominik Schatzmann, Simon Leinen, Jochen Köge...
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 2 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
VISUALIZATION
1997
IEEE
13 years 11 months ago
Application-controlled demand paging for out-of-core visualization
In the area of scientific visualization, input data sets are often very large. In visualization of Computational Fluid Dynamics (CFD) in particular, input data sets today can surp...
Michael Cox, David Ellsworth
EXPCS
2007
13 years 11 months ago
The user in experimental computer systems research
Experimental computer systems research typically ignores the end-user, modeling him, if at all, in overly simple ways. We argue that this (1) results in inadequate performance eva...
Peter A. Dinda, Gokhan Memik, Robert P. Dick, Bin ...