Sciweavers

37217 search results - page 7430 / 7444
» or 2010
Sort
View
ACSAC
2010
IEEE
13 years 7 days ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
APSEC
2010
IEEE
13 years 7 days ago
Evaluating Cloud Platform Architecture with the CARE Framework
There is an emergence of cloud application platforms such as Microsoft’s Azure, Google’s App Engine and Amazon’s EC2/SimpleDB/S3. Startups and Enterprise alike, lured by the...
Liang Zhao, Anna Liu, Jacky Keung
BIBE
2010
IEEE
169views Bioinformatics» more  BIBE 2010»
13 years 7 days ago
A Novel Wavelet Based Algorithm for Spike and Wave Detection in Absence Epilepsy
—Absence seizures are characterized by sudden loss of consciousness and interruption of ongoing motor activities for a brief period of time lasting few to several seconds and up ...
Petros Xanthopoulos, Steffen Rebennack, Chang-Chia...
CASON
2010
IEEE
13 years 7 days ago
Social Network Reduction Based on Stability
—The analysis of social networks is concentrated especially on uncovering hidden relations and properties of network members (vertices). Most of the current approaches are focuse...
Milos Kudelka, Zdenek Horak, Václav Sn&aacu...
CDC
2010
IEEE
125views Control Systems» more  CDC 2010»
13 years 7 days ago
Persistent patrol with limited-range on-board sensors
— We propose and analyze the Persistent Patrol Problem (PPP). An unmanned aerial vehicle (UAV) moving with constant speed and unbounded acceleration patrols a bounded region of t...
Vu Anh Huynh, John Enright, Emilio Frazzoli
« Prev « First page 7430 / 7444 Last » Next »