Sciweavers

927 search results - page 149 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
EUROSYS
2008
ACM
16 years 1 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman
DAC
2009
ACM
16 years 5 months ago
Way Stealing:cache-assisted automatic instruction set extensions
This paper introduces Way Stealing, a simple architectural modification to a cache-based processor to increase data bandwidth to and from application-specific Instruction Set Exte...
Theo Kluter, Philip Brisk, Paolo Ienne, Edoardo Ch...
ICASSP
2011
IEEE
14 years 8 months ago
Cooperative sensing in cognitive networks under malicious attack
Abstract—This paper considers cooperative sensing in cognitive networks under Spectrum Sensing Data Falsification attack (SSDF) in which malicious users can intentionally send f...
Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li
KDD
2007
ACM
177views Data Mining» more  KDD 2007»
16 years 4 months ago
On-board analysis of uncalibrated data for a spacecraft at mars
Analyzing data on-board a spacecraft as it is collected enables several advanced spacecraft capabilities, such as prioritizing observations to make the best use of limited bandwid...
Benyang Tang, Kiri Wagstaff, Rebecca Castañ...
STACS
2010
Springer
15 years 11 months ago
Relaxed Spanners for Directed Disk Graphs
Let (V, δ) be a finite metric space, where V is a set of n points and δ is a distance function defined for these points. Assume that (V, δ) has a constant doubling dimension d...
David Peleg, Liam Roditty