Sciweavers

932 search results - page 156 / 187
» Verifying Progress in Timed Systems
Sort
View
COMPSAC
2008
IEEE
14 years 3 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
14 years 3 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang
IWNAS
2008
IEEE
14 years 3 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
14 years 3 months ago
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image
Some (k, n)-threshold image secret sharing schemes encrypt the secret image into n noise-like shadow images with size 1/k times that of the original secret image. The small size o...
Ching-Nung Yang, Tse-Shih Chen
IPPS
2006
IEEE
14 years 3 months ago
Placement and routing of Boolean functions in constrained FPGAs using a distributed genetic algorithm and local search
In this work we present a system for implementing the placement and routing stages in the FPGA cycle of design, into the physical design stage. We start with the ISCAS benchmarks,...
Manuel Rubio del Solar, Juan Manuel Sánchez...