Sciweavers

477 search results - page 29 / 96
» Removing even crossings
Sort
View
SP
2007
IEEE
14 years 1 months ago
The Emperor's New Security Indicators
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...
ICASSP
2009
IEEE
14 years 2 months ago
Multi-flow attack resistant watermarks for network flows
In this work we present a Multi-flow Attack Resistant Interval Centroid Based Watermarking (MAR-ICBW) scheme for network flows. Our proposed scheme can withstand the newly intro...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
ICDE
2007
IEEE
152views Database» more  ICDE 2007»
14 years 1 months ago
Automatically Identifying Known Software Problems
Re-occurrence of the same problem is very common in many large software products. By matching the symptoms of a new problem to those in a database of known problems, automated dia...
Natwar Modani, Rajeev Gupta, Guy M. Lohman, Tanvee...
ISSTA
2006
ACM
14 years 1 months ago
Architecture-driven platform independent deterministic replay for distributed hard real-time systems
Distributed hard real-time systems have become a major component of many advanced technical products. Means to ensure their proper quality are thus of paramount importance. To ens...
Holger Giese, Stefan Henkler
RT
2004
Springer
14 years 27 days ago
CC Shadow Volumes
We present a technique that uses culling and clamping (CC) for accelerating the performance of stencil-based shadow volume computation. Our algorithm reduces the fill requirement...
Brandon Lloyd, Jeremy Wend, Naga K. Govindaraju, D...