Sciweavers

5269 search results - page 1002 / 1054
» order 2007
Sort
View
SECON
2007
IEEE
15 years 10 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
SMC
2007
IEEE
224views Control Systems» more  SMC 2007»
15 years 10 months ago
Complex networks as control paradigm for complex systems
—Rooted in a deep understanding of their major properties, a control paradigm for complex systems is proposed based on latest advances in modeling the dynamics of complex network...
Stefan Grobbelaar, Mihaela Ulieru
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 10 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
SSDBM
2007
IEEE
127views Database» more  SSDBM 2007»
15 years 10 months ago
Update Conscious Bitmap Indices
Bitmap indices have been widely used in several domains such as data warehousing and scientific applications due to their efficiency in answering certain query types over large ...
Guadalupe Canahuate, Michael Gibas, Hakan Ferhatos...
TPHOL
2007
IEEE
15 years 10 months ago
Verifying Nonlinear Real Formulas Via Sums of Squares
Techniques based on sums of squares appear promising as a general approach to the universal theory of reals with addition and multiplication, i.e. verifying Boolean combinations of...
John Harrison
« Prev « First page 1002 / 1054 Last » Next »