Sciweavers

984 search results - page 62 / 197
» ideas 2006
Sort
View
ACSAC
2006
IEEE
14 years 4 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
ACSAC
2006
IEEE
14 years 4 months ago
Anomaly Based Web Phishing Page Detection
Many anti-phishing schemes have recently been proposed in literature. Despite all those efforts, the threat of phishing attacks is not mitigated. One of the main reasons is that p...
Ying Pan, Xuhua Ding
AHS
2006
IEEE
152views Hardware» more  AHS 2006»
14 years 4 months ago
Architecture of a Dynamically Reconfigurable NoC for Adaptive Reconfigurable MPSoC
This paper describes the architecture of our dynamically reconfigurable Network-on-Chip (NoC) architecture that has been proposed for reconfigurable Multiprocessor system-on-chip ...
Balal Ahmad, Ahmet T. Erdogan, Sami Khawam
AINA
2006
IEEE
14 years 4 months ago
Combinatorial Fusion Criteria for Real-Time Tracking
We address the problem of automated video tracking of targets when targets undergo multiple mutual occlusions. Our approach is based on the idea that as targets are occluded, sele...
D. Frank Hsu, Damian M. Lyons, Jizhou Ai
COMPSAC
2006
IEEE
14 years 4 months ago
A Practical Approach for Automated Test Case Generation using Statecharts
This paper presents an approach for automated test case generation using a software specification modeled in Statecharts. The steps defined in such approach involve: translation o...
Valdivino A. Santiago, Ana Silvia Martins do Amara...