Sciweavers

796 search results - page 102 / 160
» Spoofing prevention method
Sort
View
ICC
2008
IEEE
134views Communications» more  ICC 2008»
14 years 4 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
14 years 4 months ago
Protection and Restoration from Link Failures in DWDM Networks: A Cross-Layer Study
— Protection against failure in high bandwidth optical networks can prevent significant potential losses of data but at the same time it requires a considerable fraction of the ...
Amir Askarian, Yuxiang Zhai, Suresh Subramaniam, Y...
IROS
2008
IEEE
191views Robotics» more  IROS 2008»
14 years 4 months ago
Local Gaussian process regression for real-time model-based robot control
— High performance and compliant robot control requires accurate dynamics models which cannot be obtained analytically for sufficiently complex robot systems. In such cases, mac...
Duy Nguyen-Tuong, Jan Peters
ISCAS
2008
IEEE
84views Hardware» more  ISCAS 2008»
14 years 4 months ago
Pulse-based signal compression for implanted neural recording systems
— Today’s implanted neural systems are bound by tight constraints on power and communication bandwidth. Most conventional ADC-based approaches fall into two categories. Either ...
John G. Harris, Jose C. Principe, Justin C. Sanche...
HICSS
2007
IEEE
269views Biometrics» more  HICSS 2007»
14 years 4 months ago
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process
This paper discusses the need for both a series of electronic tools and procedural changes to the evidence collection process to accommodate the possibilities of wireless technolo...
Benjamin Turnbull, Jill Slay