Sciweavers

75 search results - page 10 / 15
» Potential Fire Detection based on Kalman-driven Change Detec...
Sort
View
TRUST
2010
Springer
14 years 1 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
DAC
1994
ACM
14 years 20 days ago
Fitting Formal Methods into the Design Cycle
This tutorial introduces several methods of formal hardware veri cation that could potentially have a practical impact on the design process. The measure of success in integrating...
Kenneth L. McMillan
ACL
2009
13 years 6 months ago
The Contribution of Stylistic Information to Content-based Mobile Spam Filtering
Content-based approaches to detecting mobile spam to date have focused mainly on analyzing the topical aspect of a SMS message (what it is about) but not on the stylistic aspect (...
Dae-Neung Sohn, Jung-Tae Lee, Hae-Chang Rim
CGF
2010
106views more  CGF 2010»
13 years 8 months ago
Alleviating the Modifiable Areal Unit Problem within Probe-Based Geospatial Analyses
We present a probe-based interface for the exploration of the results of a geospatial simulation of urban growth. Because our interface allows the user great freedom in how they c...
Thomas Butkiewicz, Ross K. Meentemeyer, Douglas A....
ETFA
2006
IEEE
14 years 7 days ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron