Sciweavers

796 search results - page 105 / 160
» Spoofing prevention method
Sort
View
ICICS
2007
Springer
14 years 4 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
ICRA
2006
IEEE
148views Robotics» more  ICRA 2006»
14 years 4 months ago
Surface Patch Reconstruction via Curve Sampling
This paper introduces a method that reconstructs a surface patch by sampling along three concurrent curves on the surface with a touch sensor. These data curves, each lying in a d...
Yan-Bin Jia, Liangchuan Mi, Jiang Tian
ICSEA
2006
IEEE
14 years 4 months ago
Enforcing Interaction Properties in AOSD-Enabled Systems
The construction and maintenance of large and complex software systems depend on the existence of global principles describing the structure and the interaction among its various ...
Constantin Serban, Shmuel S. Tyszberowicz
IPPS
2006
IEEE
14 years 4 months ago
Effecting parallel graph eigensolvers through library composition
— Many interesting problems in graph theory can be reduced to solving an eigenproblem of the adjacency matrix or Laplacian of a graph. Given the availability of high-quality line...
A. Breuer, Peter Gottschling, Douglas Gregor, Andr...
DAC
2006
ACM
14 years 3 months ago
High-performance operating system controlled memory compression
This article describes a new software-based on-line memory compression algorithm for embedded systems and presents a method of adaptively managing the uncompressed and compressed ...
Lei Yang, Haris Lekatsas, Robert P. Dick