Sciweavers

524 search results - page 91 / 105
» Why phishing works
Sort
View
IRI
2008
IEEE
14 years 4 months ago
Computation with imprecise probabilities
abstract An imprecise probability distribution is an instance of second-order uncertainty, that is, uncertainty about uncertainty, or uncertainty for short. Another instance is an ...
Lotfi A. Zadeh
ISPASS
2008
IEEE
14 years 4 months ago
Metrics for Architecture-Level Lifetime Reliability Analysis
Abstract— This work concerns metrics for evaluating microarchitectural enhancements to improve processor lifetime reliability. A commonly reported reliability metric is mean time...
Pradeep Ramachandran, Sarita V. Adve, Pradip Bose,...
WETICE
2008
IEEE
14 years 4 months ago
Coordination of Knowledge in Pervasive Environments
The “amount” of knowledge is constantly growing. Technological advances more and more facilitate an access to knowledge in an anytime, anywhere, and anyhow manner. The provisi...
Manfred Bortenschlager, Lyndon J. B. Nixon, Robert...
INFOCOM
2007
IEEE
14 years 4 months ago
Software TDMA for VoIP Applications Over IEEE802.11 Wireless LAN
Abstract—An emerging killer application for enterprise wireless LANs (WLANs) is voice over IP (VoIP) telephony, which promises to greatly improve the reachability and mobility of...
Fanglu Guo, Tzi-cker Chiueh
ISPASS
2007
IEEE
14 years 4 months ago
PTLsim: A Cycle Accurate Full System x86-64 Microarchitectural Simulator
In this paper, we introduce PTLsim, a cycle accurate full system x86-64 microprocessor simulator and virtual machine. PTLsim models a modern superscalar out of order x86-64 proces...
Matt T. Yourst