Sciweavers

5722 search results - page 1068 / 1145
» Security Function Interactions
Sort
View
ISF
2010
273views more  ISF 2010»
13 years 8 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven
MONET
2011
13 years 6 months ago
Jamming in Wireless Networks Under Uncertainty
— The problem of jamming plays an important role in ensuring the quality and security of wireless communications, especially at this moment when wireless networks are quickly bec...
Eitan Altman, Konstantin Avrachenkov, Andrey Garna...
TVLSI
2010
13 years 5 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
13 years 1 months ago
Oracle database filesystem
Modern enterprise, web, and multimedia applications are generating unstructured content at unforeseen volumes in the form of documents, texts, and media files. Such content is gen...
Krishna Kunchithapadam, Wei Zhang, Amit Ganesh, Ni...
CVPR
2006
IEEE
15 years 1 months ago
Applying Ensembles of Multilinear Classifiers in the Frequency Domain
Ensemble methods such as bootstrap, bagging or boosting have had a considerable impact on recent developments in machine learning, pattern recognition and computer vision. Theoret...
Christian Bauckhage, Thomas Käster, John K. T...
« Prev « First page 1068 / 1145 Last » Next »