Sciweavers

11603 search results - page 2189 / 2321
» Securing Embedded Systems
Sort
View
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...
110
Voted
ICNP
2006
IEEE
15 years 8 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
103
Voted
ICRA
2006
IEEE
61views Robotics» more  ICRA 2006»
15 years 8 months ago
Simulated Odor Tracking in a Plane Normal to the Wind Direction
— A new strategy is developed for tracking an odor plume in an environment where wind is present. The strategy is inspired by the mechanisms that animals use to orient to stimuli...
Adam J. Rutkowski, Mark A. Willis, Roger D. Quinn
129
Voted
ISSRE
2006
IEEE
15 years 8 months ago
Memoized Forward Computation of Dynamic Slices
Forward computation of dynamic slices is necessary to support interactive debugging and online analysis of long running programs. However, the overhead of existing forward computi...
Wes Masri, Nagi Nahas, Andy Podgurski
93
Voted
NDSS
2006
IEEE
15 years 8 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
« Prev « First page 2189 / 2321 Last » Next »