Sciweavers

120 search results - page 21 / 24
» Modeling Malware Spreading Dynamics
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 25 days ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
INFOCOM
2003
IEEE
14 years 25 days ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
HOTNETS
2010
13 years 2 months ago
Diagnosing mobile applications in the wild
There are a lot of applications that run on modern mobile operating systems. Inevitably, some of these applications fail in the hands of users. Diagnosing a failure to identify the...
Sharad Agarwal, Ratul Mahajan, Alice Zheng, Victor...
ICCAD
2006
IEEE
129views Hardware» more  ICCAD 2006»
14 years 1 months ago
A high-quality mixed-size analytical placer considering preplaced blocks and density constraints
In addition to wirelength, modern placers need to consider various constraints such as preplaced blocks and density. We propose a high-quality analytical placement algorithm consi...
Tung-Chieh Chen, Zhe-Wei Jiang, Tien-Chang Hsu, Hs...
PG
2002
IEEE
14 years 14 days ago
On the Effects of Haptic Display in Brush and Ink Simulation for Chinese Painting and Calligraphy
In this paper, we develop an interactive haptic system, which can be further aid for digital Chinese painting. When an artist is holding our force feedback device, one feels like ...
Jeng-Sheng Yeh, Ting-yu Lien, Ming Ouhyoung