Sciweavers

698 search results - page 101 / 140
» Evaluating Key Statements Analysis
Sort
View
ATAL
2007
Springer
14 years 4 months ago
On the Behavior of Competing Markets Populated by Automated Traders
Abstract. Real market institutions, stock and commodity exchanges for example, do not occur in isolation. Company stock is frequently listed on several stock exchanges, allowing tr...
Jinzhong Niu, Kai Cai, Simon Parsons, Elizabeth Sk...
CAIP
2007
Springer
182views Image Analysis» more  CAIP 2007»
14 years 4 months ago
Assessing Artery Motion Compensation in IVUS
Abstract. Cardiac dynamics suppression is a main issue for visual improvement and computation of tissue mechanical properties in IntraVascular UltraSound (IVUS). Although in recent...
Debora Gil, Oriol Rodriguez-Leor, Petia Radeva, Au...
ICDCS
2006
IEEE
14 years 4 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen
MICRO
2006
IEEE
74views Hardware» more  MICRO 2006»
14 years 3 months ago
Phoenix: Detecting and Recovering from Permanent Processor Design Bugs with Programmable Hardware
Although processor design verification consumes ever-increasing resources, many design defects still slip into production silicon. In a few cases, such bugs have caused expensive...
Smruti R. Sarangi, Abhishek Tiwari, Josep Torrella...
WSE
2006
IEEE
14 years 3 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...