Sciweavers

3176 search results - page 577 / 636
» Strategic product development
Sort
View
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 9 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
ICRA
2002
IEEE
100views Robotics» more  ICRA 2002»
15 years 9 months ago
Achieving Sharp Deliveries in Supply Chains through Variance Pool Allocation
Variability reduction and business process synchronization are acknowledged as key to achieving sharp and timely deliveries in supply chain networks. In this paper, we develop an ...
Dinesh Garg, Yadati Narahari, Nukala Viswanadham
LCN
2002
IEEE
15 years 9 months ago
A User Level Framework for Ad Hoc Routing
The availability of inexpensive wireless networking hardware (e.g., based on the IEEE 802.11 standards) has generated interest in a large class of wireless applications. Many appl...
Jérémie Allard, Paul Gonin, Minoo Si...
SIGMETRICS
2010
ACM
143views Hardware» more  SIGMETRICS 2010»
15 years 9 months ago
Practical performance models for complex, popular applications
Perhaps surprisingly, no practical performance models exist for popular (and complex) client applications such as Adobe’s Creative Suite, Microsoft’s Office and Visual Studio...
Eno Thereska, Bjoern Doebel, Alice X. Zheng, Peter...
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
15 years 9 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...