Sciweavers

222 search results - page 28 / 45
» Secure Content Delivery using Key Composition
Sort
View
DOCENG
2006
ACM
14 years 1 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
BROADCOM
2008
IEEE
14 years 2 months ago
Low Cost Active Antenna Arrays
Active antenna arrays are very valuable in creating reconfigurable, low-cost, wireless point-to-point networks. These wireless links can be used for a variety of applications from...
Dan Busuioc, Safieddin Safavi-Naeini
HOST
2009
IEEE
14 years 2 months ago
Local Heating Attacks on Flash Memory Devices
This paper shows how lasers can be used to implement modification attacks on EEPROM and Flash memory devices. This was achieved with inexpensive laser-diode module mounted on a mic...
Sergei P. Skorobogatov
COLCOM
2008
IEEE
13 years 9 months ago
Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites
Abstract. Malicious Web content poses a serious threat to the Internet, organizations and users. Current approaches to detecting malicious Web content employ high-powered honey cli...
Jiang Wang, Anup K. Ghosh, Yih Huang
ITS
2010
Springer
169views Multimedia» more  ITS 2010»
14 years 13 days ago
Automatic Question Generation for Literature Review Writing Support
This paper presents a novel Automatic Question Generation (AQG) approach that generates trigger questions as a form of support for students’ learning through writing. The approac...
Ming Liu, Rafael A. Calvo, Vasile Rus