Sciweavers

4636 search results - page 772 / 928
» Modelling and Validation with VipTool
Sort
View
CSSE
2008
IEEE
14 years 3 months ago
Rapid Acquirement and Visualization of CityGML Documents
—With the development of the Internet, the need of city 3D data is rising more and more, and the emphasis shifts from analysis to the sharing of city 3D data and information over...
Lingli Zhao, Shuai Liu, Junsheng Li, Haicheng Xu
DSN
2008
IEEE
14 years 3 months ago
SymPLFIED: Symbolic program-level fault injection and error detection framework
This paper introduces SymPLFIED, a program-level framework which allows specification of arbitrary error detectors and the verification of their efficacy against hardware errors. ...
Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalba...
GLOBECOM
2008
IEEE
14 years 3 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
14 years 3 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
HOST
2008
IEEE
14 years 3 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris