Sciweavers

3658 search results - page 578 / 732
» Founding properties on measurement
Sort
View
SUTC
2006
IEEE
14 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ASPLOS
2006
ACM
14 years 3 months ago
HeapMD: identifying heap-based bugs using anomaly detection
We present the design, implementation, and evaluation of HeapMD, a dynamic analysis tool that finds heap-based bugs using anomaly detection. HeapMD is based upon the observation ...
Trishul M. Chilimbi, Vinod Ganapathy
MIR
2006
ACM
354views Multimedia» more  MIR 2006»
14 years 3 months ago
Constant tangential angle elected interest points
This paper presents a new interest points detector whose goal is to better catch visual attention than standard detectors. It is based on the generalization of Loy and Zelinsky tr...
Ahmed Rebai, Alexis Joly, Nozha Boujemaa
SIGIR
2006
ACM
14 years 3 months ago
Topical link analysis for web search
Traditional web link-based ranking schemes use a single score to measure a page’s authority without concern of the community from which that authority is derived. As a result, a...
Lan Nie, Brian D. Davison, Xiaoguang Qi
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
14 years 3 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...