Sciweavers

2236 search results - page 280 / 448
» Intrusion detection techniques and approaches
Sort
View
DSN
2006
IEEE
14 years 2 months ago
Efficient High Hamming Distance CRCs for Embedded Networks
Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter weight checksum techn...
Justin Ray, Philip Koopman
TCAD
2002
134views more  TCAD 2002»
13 years 10 months ago
Testing and diagnosis of interconnect faults in cluster-based FPGA architectures
As IC densities are increasing, cluster-based FPGA architectures are becoming the architecture of choice for major FPGA manufacturers. A cluster-based architecture is one in which...
Ian G. Harris, Russell Tessier
ADHOC
2007
164views more  ADHOC 2007»
13 years 11 months ago
Attack-resilient time synchronization for wireless sensor networks
The existing time synchronization schemes in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first id...
Hui Song, Sencun Zhu, Guohong Cao
CHI
2011
ACM
13 years 2 months ago
TouchCuts and TouchZoom: enhanced target selection for touch displays using finger proximity sensing
Although touch-screen laptops are increasing in popularity, users still do not comfortably rely on touch in these environments, as current software interfaces were not designed fo...
Xing-Dong Yang, Tovi Grossman, Pourang Irani, Geor...
MTA
2002
195views more  MTA 2002»
13 years 10 months ago
Shot Partitioning Based Recognition of TV Commercials
Digital video applications exploit the intrinsic structure of video sequences. In order to obtain and represent this structure for video annotation and indexing tasks, the main ini...
Juan María Sánchez, Xavier Binefa, J...