Sciweavers

57 search results - page 5 / 12
» Exploiting Symmetry in Protocol Testing
Sort
View
IPPS
2007
IEEE
14 years 5 months ago
Exploring a Multithreaded Methodology to Implement a Network Communication Protocol on the Cyclops-64 Multithreaded Architecture
The IBM Cyclops-64 (C64) chip employs a multithreaded architecture that integrates a large number of hardware thread units on a single chip. A cellular supercomputer is being deve...
Ge Gan, Ziang Hu, Juan del Cuvillo, Guang R. Gao
RAID
2007
Springer
14 years 5 months ago
Comparing Anomaly Detection Techniques for HTTP
Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been...
Kenneth L. Ingham, Hajime Inoue
CIARP
2006
Springer
14 years 26 days ago
General Pose Face Recognition Using Frontal Face Model
We present a face recognition system able to identify people from a single non-frontal image in an arbitrary pose. The key component of the system is a novel pose correction techni...
Jean-Yves Guillemaut, Josef Kittler, Mohammad Sade...
TIFS
2010
184views more  TIFS 2010»
13 years 9 months ago
Information-theoretically secret key generation for fading wireless channels
—The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, ...
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra S...
ANSOFT
2002
94views more  ANSOFT 2002»
13 years 10 months ago
Testing Processes of Web Applications
Abstract. Current practice in Web application development is based on the skills of the individual programmers and often does not apply the principles of software engineering. The ...
Filippo Ricca, Paolo Tonella