Sciweavers

557 search results - page 10 / 112
» Two experiences designing for effective security
Sort
View
SYSTOR
2010
ACM
14 years 8 days ago
Operating system virtualization: practice and experience
Operating system (OS) virtualization can provide a number of important benefits, including transparent migration of applications, server consolidation, online OS maintenance, and...
Oren Laadan, Jason Nieh
EIT
2008
IEEE
13 years 9 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
DEXAW
2003
IEEE
94views Database» more  DEXAW 2003»
14 years 23 days ago
Experiences Running a Web Anonymising Service
The research project “AN.ON – Anonymity online” focuses on developing and providing a web anonymising service. This service provides anonymity and unobservability against ex...
Claudia Golembiewski, Marit Hansen, Sandra Steinbr...
ISBRA
2007
Springer
14 years 1 months ago
A Bootstrap Correspondence Analysis for Factorial Microarray Experiments with Replications
Characterized by simultaneous measurement of the effects of experimental factors and their interactions, the economic and efficient factorial design is well accepted in microarray ...
Qihua Tan, Jesper Dahlgaard, Basem M. Abdallah, We...
IJVR
2007
124views more  IJVR 2007»
13 years 7 months ago
The Effect of Gaps Between Displays on Spatial Perception and Cognition Tasks in Virtual Environments
—We propose the concept of Gap Between Displays (GBD) as a component of immersion in virtual environment systems. We hypothesized that GBD may reduce users’ task performance in...
Yi Wang, Kunmi Otitoju, Tong Liu, Sijung Kim, Doug...