Sciweavers

52 search results - page 5 / 11
» On the effectiveness of the metamorphic shield
Sort
View
CHI
2006
ACM
14 years 7 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
CVPR
2004
IEEE
14 years 8 months ago
Invariant Operators, Small Samples, and the Bias-Variance Dilemma
Invariant features or operators are often used to shield the recognition process from the effect of "nuisance" parameters, such as rotations, foreshortening, or illumina...
Xiaojin Shi, Roberto Manduchi
RTAS
2000
IEEE
13 years 10 months ago
Policing Offloaded
Policing of incoming packets can produce very high load in worst-case situations on a receiving computer. In realtime systems, resources must be allocated for such worstcase situa...
Uwe Dannowski, Hermann Härtig
ISCAS
2008
IEEE
117views Hardware» more  ISCAS 2008»
14 years 1 months ago
Electrical modeling and characterization of 3-D vias
Abstract— Electrical characterization of the resistance, capacitance, and inductance of inter-plane 3-D vias is presented in this paper. Both capacitive and inductive coupling be...
Ioannis Savidis, Eby G. Friedman
GLVLSI
2006
IEEE
120views VLSI» more  GLVLSI 2006»
14 years 23 days ago
Sensitivity evaluation of global resonant H-tree clock distribution networks
A sensitivity analysis of resonant H-tree clock distribution networks is presented in this paper for a TSMC 0.18 μm CMOS technology. The analysis focuses on the effect of the dri...
Jonathan Rosenfeld, Eby G. Friedman