Sciweavers

986 search results - page 153 / 198
» Protecting the Intranet Against
Sort
View
FAST
2007
13 years 9 months ago
REO: A Generic RAID Engine and Optimizer
Present day applications that require reliable data storage use one of five commonly available RAID levels to protect against data loss due to media or disk failures. With a mark...
Deepak R. Kenchammana-Hosekote, Dingshan He, James...
ICISC
2008
129views Cryptology» more  ICISC 2008»
13 years 9 months ago
Novel PUF-Based Error Detection Methods in Finite State Machines
We propose a number of techniques for securing finite state machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on physically unclonable fun...
Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar
SDM
2008
SIAM
165views Data Mining» more  SDM 2008»
13 years 9 months ago
On the Dangers of Cross-Validation. An Experimental Evaluation
Cross validation allows models to be tested using the full training set by means of repeated resampling; thus, maximizing the total number of points used for testing and potential...
R. Bharat Rao, Glenn Fung
AISM
2004
13 years 9 months ago
Approaches to IT Security in Small and Medium Enterprises
Organisations of all sizes are now significantly reliant upon information technology and networks for the operation of their business activities. All therefore have a consequent r...
Vassilis Dimopoulos, Steven Furnell, Murray Jennex...
APBC
2004
107views Bioinformatics» more  APBC 2004»
13 years 9 months ago
An Empirical Bayes Adjustment to Multiple p-values for the Detection of Differentially Expressed Genes in Microarray Experiments
In recent microarray experiments thousands of gene expressions are simultaneously tested in comparing samples (e.g., tissue types or experimental conditions). Application of a sta...
Somnath Datta, Susmita Datta