Sciweavers

784 search results - page 98 / 157
» What would they think
Sort
View
ACSAC
2007
IEEE
14 years 2 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski
DATE
2007
IEEE
126views Hardware» more  DATE 2007»
14 years 2 months ago
A future of customizable processors: are we there yet?
Customizable processors are being used increasingly often in SoC designs. During the past few years, they have proven to be a good way to solve the conflicting flexibility and p...
Laura Pozzi, Pierre G. Paulin
GLOBECOM
2007
IEEE
14 years 2 months ago
A Geometric Approach to Slot Alignment in Wireless Sensor Networks
— Traditionally, slotted communication protocols have employed guard times to delineate and align slots. These guard times may expand the slot duration significantly, especially...
Niky Riga, Ibrahim Matta, Azer Bestavros
HICSS
2007
IEEE
153views Biometrics» more  HICSS 2007»
14 years 2 months ago
Mobile TV - To Live or Die by Content
Mobile TV is described as a natural and evolutionary next step as mobile phones get more multimedia features. Mobile network operators expect mobile TV to support the adoption of ...
Christer Carlsson, Pirkko Walden
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 2 months ago
SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures
— In this paper, we introduce a new scheme called SecureRank for prioritizing vulnerabilities to patch in computing systems/networks. This has become a key issue for IT infrastru...
Reiko Ann Miura-Ko, Nicholas Bambos