Sciweavers

2236 search results - page 345 / 448
» Intrusion detection techniques and approaches
Sort
View
DATE
2005
IEEE
169views Hardware» more  DATE 2005»
14 years 2 months ago
Activity Packing in FPGAs for Leakage Power Reduction
In this paper, two packing algorithms for the detection of activity profiles in MTCMOS-based FPGA structures are proposed for leakage power mitigation. The first algorithm is a ...
Hassan Hassan, Mohab Anis, Antoine El Daher, Moham...
DFT
2005
IEEE
64views VLSI» more  DFT 2005»
14 years 2 months ago
Implementation of Concurrent Checking Circuits by Independent Sub-circuits
The present paper proposes a new method for detecting arbitrary faults in a functional circuit when the set of codewords is limited and known in advance. The method is based on im...
Vladimir Ostrovsky, Ilya Levin
ICDE
2005
IEEE
108views Database» more  ICDE 2005»
14 years 2 months ago
Robust Identification of Fuzzy Duplicates
Detecting and eliminating fuzzy duplicates is a critical data cleaning task that is required by many applications. Fuzzy duplicates are multiple seemingly distinct tuples which re...
Surajit Chaudhuri, Venkatesh Ganti, Rajeev Motwani
ICSM
2005
IEEE
14 years 2 months ago
Incremental Maintenance of Software Artifacts
We have built a software development tool, CLIME, that uses constraints to ensure the consistency of the different artifacts associated with software. This approach to software dev...
Steven P. Reiss
NOSSDAV
2005
Springer
14 years 2 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...