Sciweavers

279 search results - page 46 / 56
» Intellectual Property Metering
Sort
View
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 4 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
AINA
2010
IEEE
13 years 4 months ago
Neural Network Trainer through Computer Networks
- This paper introduces a neural network training tool through computer networks. The following algorithms, such as neuron by neuron (NBN) [1][2], error back propagation (EBP), Lev...
Nam Pham, Hao Yu, Bogdan M. Wilamowski
CCS
2011
ACM
12 years 7 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
GIS
2004
ACM
14 years 8 months ago
Exploiting online sources to accurately geocode addresses
Many Geographic Information System (GIS) applications require the conversion of an address to geographic coordinates. This process is called geocoding. The traditional geocoding m...
Rahul Bakshi, Craig A. Knoblock, Snehal Thakkar
IJCAI
1989
13 years 8 months ago
On the Declarative Semantics of Inheritance Networks
Usually, semantics of inheritance networks is specified indirectly through a translation into one of the standard logical formalisms. Since such translation involves an algorithmi...
Krishnaprasad Thirunarayan, Michael Kifer, David S...