Sciweavers

525 search results - page 94 / 105
» The Davies-Murphy Power Attack
Sort
View
SAC
2009
ACM
14 years 2 months ago
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal
The firmware of an electronic voting machine is typically treated as a “trusted” component of the system. Consequently, it is misconstrued to be vulnerable only to an insider...
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, La...
CVPR
2007
IEEE
14 years 12 months ago
Statistics of Infrared Images
The proliferation of low-cost infrared cameras gives us a new angle for attacking many unsolved vision problems by leveraging a larger range of the electromagnetic spectrum. A fir...
Nigel J. W. Morris, Shai Avidan, Wojciech Matusik,...
ICDE
2003
IEEE
114views Database» more  ICDE 2003»
14 years 11 months ago
Designing a Super-Peer Network
A super-peer is a node in a peer-to-peer network that operates both as a server to a set of clients, and as an equal in a network of super-peers. Super-peer networks strike a bala...
Beverly Yang, Hector Garcia-Molina
WWW
2008
ACM
14 years 10 months ago
A systematic approach for cell-phone worm containment
Cell phones are increasingly becoming attractive targets of various worms, which cause the leakage of user privacy, extra service charges and depletion of battery power. In this w...
Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu
SOSP
2003
ACM
14 years 6 months ago
Preserving peer replicas by rate-limited sampled voting
The LOCKSS project has developed and deployed in a worldwide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It c...
Petros Maniatis, David S. H. Rosenthal, Mema Rouss...