page
Submitted by Daniel Wolf on Sun, 06/22/2014 - 2:44pm
page
Submitted by Daniel Wolf on Sun, 06/22/2014 - 10:37am
page
Submitted by Daniel Wolf on Sun, 06/08/2014 - 6:40am
page
Submitted by Daniel Wolf on Fri, 06/06/2014 - 4:57pm

Broadly speaking, signal processing covers signal acquisition and reconstruction, quality improvement, signal compression and feature extraction. Each of these processes introduces vulnerabilities into communications and other systems. The research articles cited here explore trust between networks, steganalysis, tracing passwords across networks, and certificates.
page
Submitted by Daniel Wolf on Fri, 06/06/2014 - 4:52pm
page
Submitted by Daniel Wolf on Fri, 06/06/2014 - 4:45pm
page
Submitted by Daniel Wolf on Fri, 06/06/2014 - 4:41pm

Authorization and authentication are cornerstones of computer security. As systems become larger, faster and more complex, authorization and authentication methods and protocols are proving to have limits and challenges. The research cited here explores new methods and techniques for improving security in cloud environments, efficient cryptographic computations, and exascale storage systems.
page
Submitted by Daniel Wolf on Fri, 06/06/2014 - 11:50am
page
Submitted by Daniel Wolf on Fri, 06/06/2014 - 11:38am
page
Submitted by Daniel Wolf on Fri, 06/06/2014 - 11:26am

The Operating Systems citations cover publications and presentations since fall of 2013. Specific works include studies on such as an empirical study showing that the performance difference between double hashing and fully random hashing appears negligible, how to structure parallel peeling algorithms, and about uniform quantization, Software-as-a-Service (SaaS)