Sciweavers

796 search results - page 99 / 160
» Spoofing prevention method
Sort
View
MICCAI
2009
Springer
14 years 5 months ago
Towards Interactive Planning of Coil Embolization in Brain Aneurysms
Abstract. Many vascular pathologies can now be treated in a minimally invasive way thanks to interventional radiology. Instead of open surgery, it allows to reach the lesion of the...
Jérémie Dequidt, Christian Duriez, S...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 4 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
PERCOM
2009
ACM
14 years 4 months ago
Localizing Jammers in Wireless Networks
Abstract—Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not ...
Hongbo Liu, Wenyuan Xu, Yingying Chen, Zhenhua Liu
ICLP
2009
Springer
14 years 4 months ago
An Engine for Computing Well-Founded Models
The seemingly simple choice of whether to use call variance or call subsumption in a tabled evaluation deeply affects an evaluation’s properties. Most tabling implementations hav...
Terrance Swift
FCCM
2009
IEEE
121views VLSI» more  FCCM 2009»
14 years 4 months ago
FPGA-based Monte Carlo Computation of Light Absorption for Photodynamic Cancer Therapy
—Photodynamic therapy (PDT) is a method of treating cancer that combines light and light-sensitive drugs to selectively destroy cancerous tumours without harming the healthy tiss...
Jason Luu, Keith Redmond, William Lo, Paul Chow, L...