Sciweavers

1767 search results - page 299 / 354
» An Integrated Model for Cellular Analysis
Sort
View
ESORICS
2007
Springer
14 years 1 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
DATE
2006
IEEE
115views Hardware» more  DATE 2006»
14 years 1 months ago
Optimal periodic testing of intermittent faults in embedded pipelined processor applications
Today’s nanometer technology trends have a very negative impact on the reliability of semiconductor products. Intermittent faults constitute the largest part of reliability fail...
Nektarios Kranitis, Andreas Merentitis, N. Laoutar...
ICNP
2005
IEEE
14 years 1 months ago
Trading Precision for Stability in Congestion Control with Probabilistic Packet Marking
In pricing-based congestion control protocols it is common to assume that the rate of congestion feedback from the network is limited to a single bit per packet. To obtain a preci...
Jonathan K. Shapiro, C. V. Hollot, Donald F. Towsl...
HICSS
2003
IEEE
120views Biometrics» more  HICSS 2003»
14 years 29 days ago
Evaluating On-line Learning Platforms: a Case Study
Our “information-oriented” society shows an increasing exigency of life-long learning. In such framework, online Learning is becoming an important tool to allow the flexibilit...
Francesco Colace, Massimo De Santo, Mario Vento
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
14 years 29 days ago
Telecommunication Infrastructure Investments and Firm Performance
This research adopts Barua’s [1] three-tier Business Value Complementarity (BVC) model to study the performance of telephone companies (Telcos). Our study integrates constructs ...
Hy Sonya Hsu, Siva K. Balasubramanian