Sciweavers

796 search results - page 7 / 160
» Spoofing prevention method
Sort
View
IJACTAICIT
2010
84views more  IJACTAICIT 2010»
13 years 4 months ago
An Improved Deadlock Prevention Strategy for FMSs Using Theory of Regions
The theory of regions has been recognized as the optimal deadlock prevention policy based on the marking/transition-separation instance (MTSI) or the event-state-separation-proble...
Yi-Sheng Huang, Yen-Liang Pan
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
14 years 6 months ago
Remote activation of ICs for piracy prevention and digital right management
— We introduce a remote activation scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy. Remote activation enables designers to lock eac...
Yousra Alkabani, Farinaz Koushanfar, Miodrag Potko...
P2P
2005
IEEE
14 years 3 months ago
ARA: A Robust Audit to Prevent Free-Riding in P2P Networks
A number of solutions have been proposed to address the free-riding problem in peer-to-peer file sharing systems. The solutions are either imperfect–they allow some users to ch...
MyungJoo Ham, Gul Agha
FSKD
2005
Springer
267views Fuzzy Logic» more  FSKD 2005»
14 years 3 months ago
Preventing Meaningless Stock Time Series Pattern Discovery by Changing Perceptually Important Point Detection
Discovery of interesting or frequently appearing time series patterns is one of the important tasks in various time series data mining applications. However, recent research critic...
Tak-Chung Fu, Fu-Lai Chung, Robert W. P. Luk, Chak...
GLOBECOM
2007
IEEE
14 years 4 months ago
Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware
—Bloom Filters (BFs) are fundamental building blocks in various network security applications, where packets from high-speed links are processed using state-of-the-art hardwareba...
N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. ...