Sciweavers

18209 search results - page 134 / 3642
» Some Remarks on the Paper
Sort
View
SOUPS
2005
ACM
14 years 3 months ago
Making PRIME usable
Privacy-enhanced Identity Management can enable users to retain and maintain informational self-determination in our networked society. This paper describes the usability research...
John Sören Pettersson, Simone Fischer-Hü...
CCS
2005
ACM
14 years 3 months ago
Improving Brumley and Boneh timing attack on unprotected SSL implementations
Since the remarkable work of Kocher [7], several papers considering different types of timing attacks have been published. In 2003, Brumley and Boneh presented a timing attack on...
Onur Aciiçmez, Werner Schindler, Çet...
IAT
2003
IEEE
14 years 3 months ago
Classification Rule Discovery with Ant Colony Optimization
—Ant-based algorithms or ant colony optimization (ACO) algorithms have been applied successfully to combinatorial optimization problems. More recently, Parpinelli and colleagues ...
Bo Liu, Hussein A. Abbass, Bob McKay
CDC
2009
IEEE
120views Control Systems» more  CDC 2009»
14 years 2 months ago
Multivariable three-term optimal controller design for large-scale systems
— This paper deals with the design of controllers for large-scale linear time-invariant multi-input multi-output systems, such as those that often arise in process control. We fo...
Edward J. Davison, Daniel E. Davison, Simon Lam
IPPS
2000
IEEE
14 years 2 months ago
A Mechanism for Speculative Memory Accesses Following Synchronizing Operations
In order to reduce the overhead of synchronizing operations of shared memory multiprocessors, this paper proposes a mechanism, named specMEM, to execute memory accesses following ...
Takayuki Sato, Kazuhiko Ohno, Hiroshi Nakashima