Sciweavers

8689 search results - page 1687 / 1738
» Software: hard data
Sort
View
CCS
2007
ACM
14 years 2 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
14 years 2 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima
CLEF
2007
Springer
14 years 2 months ago
Cross-Lingual Information Retrieval System for Indian Languages
This paper describes our first participation in the Indian language sub-task of the main Adhoc monolingual and bilingual track in CLEF1 competition. In this track, the task is to...
Jagadeesh Jagarlamudi, A. Kumaran
CLEF
2007
Springer
14 years 2 months ago
MIRACLE at ImageCLEFanot 2007: Machine Learning Experiments on Medical Image Annotation
This paper describes the participation of MIRACLE research consortium at the ImageCLEF Medical Image Annotation task of ImageCLEF 2007. Our areas of expertise do not include image...
Sara Lana-Serrano, Julio Villena-Román, Jos...
EMSOFT
2007
Springer
14 years 2 months ago
Optimal task placement to improve cache performance
Most recent embedded systems use caches to improve their average performance. Current timing analyses are able to compute safe timing guarantees for these systems, if tasks are ru...
Gernot Gebhard, Sebastian Altmeyer
« Prev « First page 1687 / 1738 Last » Next »