Sciweavers

3693 search results - page 148 / 739
» Paper on the Move
Sort
View
151
Voted
TELSYS
2010
132views more  TELSYS 2010»
14 years 10 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
115
Voted
DAC
1995
ACM
15 years 7 months ago
The Validity of Retiming Sequential Circuits
Retiming has been proposed as an optimizationstep forsequential circuits represented at the net-list level. Retiming moves the latches across the logic gates and in doing so chang...
Vigyan Singhal, Carl Pixley, Richard L. Rudell, Ro...
111
Voted
ICRA
2010
IEEE
101views Robotics» more  ICRA 2010»
15 years 2 months ago
Autonomous cruise control of circulating multi-robot for congestion
— This paper describes a methodology regarding an autonomous cruise control (ACC) of circulating multi-robot which is directly effective for solving the congestion regardless of ...
Satoshi Hoshino, Hiroya Seki, Yuji Naka, Jun Ota
125
Voted
ICCAD
2006
IEEE
157views Hardware» more  ICCAD 2006»
16 years 16 days ago
From single core to multi-core: preparing for a new exponential
In the past, processor design trends were dominated by increasingly complex feature sets, higher clock speeds, growing thermal envelopes and increasing power dissipation. Recently...
Jeff Parkhurst, John A. Darringer, Bill Grundmann
125
Voted
COMPSAC
2008
IEEE
15 years 10 months ago
Utilising Located Functions to Model and Optimise Distributed Computations
With developments in Grid computing and Web based data storage the task of orchestrating computations is becoming ever more difficult. Identifying which of the available computati...
Stephen Crouch, Peter Henderson, Robert John Walte...