Sciweavers

1353 search results - page 250 / 271
» Securing Current and Future Process Control Systems
Sort
View
116
Voted
CCS
2005
ACM
15 years 8 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
MIR
2010
ACM
206views Multimedia» more  MIR 2010»
15 years 7 months ago
An investigation into the relationship between semantic and content based similarity using LIDC
There is considerable research in the field of content-based medical image retrieval; however, few of the current systems investigate the relationship between the radiologists’...
Robert Kim, Grace Dasovich, Runa Bhaumik, Richard ...
151
Voted
CSREAESA
2003
15 years 3 months ago
Common Mistakes in Adiabatic Logic Design and How to Avoid Them
Most so-called “adiabatic” digital logic circuit families reported in the low-power design literature are actually not truly adiabatic, in that they do not satisfy the general...
Michael P. Frank
WSC
1997
15 years 3 months ago
Success Stories in Simulation in Health Care
Healthcare is a rapidly changing industry, and facilities are struggling to find tools to enhance their ability to keep up with the change. Healthcare staff have generally adapted...
Catherine Drury Barnes, Joaquin L. Quiason, Carson...
119
Voted
KCAP
2009
ACM
15 years 9 months ago
Workflow matching using semantic metadata
Workflows are becoming an increasingly more common paradigm to manage scientific analyses. As workflow repositories start to emerge, workflow retrieval and discovery becomes a cha...
Yolanda Gil, Jihie Kim, Gonzalo Flórez Puga...