Sciweavers

1355 search results - page 270 / 271
» Techniques for Formal Verification of Digital Systems: A Sys...
Sort
View
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
14 years 1 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
ISCA
2010
IEEE
199views Hardware» more  ISCA 2010»
13 years 11 months ago
Use ECP, not ECC, for hard failures in resistive memories
As leakage and other charge storage limitations begin to impair the scalability of DRAM, non-volatile resistive memories are being developed as a potential replacement. Unfortunat...
Stuart E. Schechter, Gabriel H. Loh, Karin Straus,...
IMC
2007
ACM
13 years 9 months ago
Compressed network monitoring for ip and all-optical networks
We address the problem of efficient end-to-end network monitoring of path metrics in communication networks. Our goal is to minimize the number of measurements or monitors requir...
Mark Coates, Yvan Pointurier, Michael Rabbat
ACSAC
2010
IEEE
13 years 5 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
MOBISYS
2007
ACM
14 years 7 months ago
MobiSteer: using steerable beam directional antenna for vehicular network access
In this work, we investigate the use of directional antennas and beam steering techniques to improve performance of 802.11 links in the context of communication between a moving v...
Vishnu Navda, Anand Prabhu Subramanian, Kannan Dha...