Sciweavers

12373 search results - page 2186 / 2475
» Semi-Logarithmic Number Systems
Sort
View
119
Voted
COMPSEC
2006
110views more  COMPSEC 2006»
15 years 4 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
CORR
2006
Springer
100views Education» more  CORR 2006»
15 years 4 months ago
Automatic annotation of multilingual text collections with a conceptual thesaurus
Automatic annotation of documents with controlled vocabulary terms (descriptors) from a conceptual thesaurus is not only useful for document indexing and retrieval. The mapping of...
Bruno Pouliquen, Ralf Steinberger, Camelia Ignat
138
Voted
CPHYSICS
2006
132views more  CPHYSICS 2006»
15 years 4 months ago
A 3D model for ion beam formation and transport simulation
In this paper, we present a three-dimensional model for self consistently modeling ion beam formation from plasma ion sources and transporting in low energy beam transport systems...
J. Qiang, D. Todd, D. Leitner
156
Voted
DPD
2006
98views more  DPD 2006»
15 years 4 months ago
GRACE-based joins on active storage devices
Contemporary long-term storage devices feature powerful embedded processors and sizeable memory buffers. Active Storage Devices (ASD) is the hard disk technology that makes use of ...
Vassilis Stoumpos, Alex Delis
FMSD
2006
104views more  FMSD 2006»
15 years 4 months ago
Some ways to reduce the space dimension in polyhedra computations
Convex polyhedra are often used to approximate sets of states of programs involving numerical variables. The manipulation of convex polyhedra relies on the so-called double descri...
Nicolas Halbwachs, David Merchat, Laure Gonnord
« Prev « First page 2186 / 2475 Last » Next »