Sciweavers

14895 search results - page 2959 / 2979
» Evaluating The Regret System
Sort
View
CONEXT
2010
ACM
13 years 6 months ago
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems
Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resoluti...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 6 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
GLOBECOM
2010
IEEE
13 years 6 months ago
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
Z. Jin, S. Anand, K. P. Subbalakshmi
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
13 years 6 months ago
Application-Aware diagnosis of runtime hardware faults
Extreme technology scaling in silicon devices drastically affects reliability, particularly because of runtime failures induced by transistor wearout. Currently available online t...
Andrea Pellegrini, Valeria Bertacco
ICIP
2010
IEEE
13 years 6 months ago
Barcode-based calibration of a 1-D blur restoration pipeline
: External Posting Date: October 21, 2010 [Fulltext] Approved for External Publication Internal Posting Date: October 21, 2010 [Fulltext] Barcode-Based Calibration of a 1-D Blur R...
Matthew Gaubatz, Steven J. Simske
« Prev « First page 2959 / 2979 Last » Next »