Sciweavers

868 search results - page 155 / 174
» The EAX Mode of Operation
Sort
View
WETICE
2000
IEEE
13 years 11 months ago
Reducing Software Security Risk through an Integrated Approach
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
David P. Gilliam, John C. Kelly, Matt Bishop
WCNC
2010
IEEE
13 years 10 months ago
A New LLMS Algorithm for Antenna Array Beamforming
A new adaptive algorithm, called LLMS, which employs an array image factor, IA , sandwiched in between two Least Mean Square (LMS) sections, is proposed for different applications ...
Jalal Abdulsayed Srar, Kah-Seng Chung, Ali Mansour
FAST
2010
13 years 9 months ago
Understanding Latent Sector Errors and How to Protect Against Them
Latent sector errors (LSEs) refer to the situation where particular sectors on a drive become inaccessible. LSEs are a critical factor in data reliability, since a single LSE can ...
Bianca Schroeder, Sotirios Damouras, Phillipa Gill
MOBISYS
2010
ACM
13 years 9 months ago
On the limits of effective hybrid micro-energy harvesting on mobile CRFID sensors
Mobile sensing is difficult without power. Emerging Computational RFIDs (CRFIDs) provide both sensing and generalpurpose computation without batteries--instead relying on small ca...
Jeremy Gummeson, Shane S. Clark, Kevin Fu, Deepak ...
USS
2004
13 years 8 months ago
Avfs: An On-Access Anti-Virus File System
Viruses and other malicious programs are an everincreasing threat to current computer systems. They can cause serious damage and consume countless hours of system administrators&#...
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wrigh...