Sciweavers

377 search results - page 43 / 76
» Getting to the Point...
Sort
View
HICSS
2008
IEEE
111views Biometrics» more  HICSS 2008»
14 years 2 months ago
Smarter Blogroll: An Exploration of Social Topic Extraction for Manageable Blogrolls
The already huge number of blogs in existence is increasing rapidly, and many users are struggling to find a way to keep up with the expansion. A number of existing tools aim to c...
Eric Baumer, Danyel Fisher
HOST
2008
IEEE
14 years 2 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris
SCAM
2008
IEEE
14 years 2 months ago
Parfait - A Scalable Bug Checker for C Code
Parfait is a bug checker of C code that has been designed to address developers’ requirements of scalability (support millions of lines of code in a reasonable amount of time), ...
Cristina Cifuentes
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
14 years 2 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
BROADNETS
2007
IEEE
14 years 2 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang