Sciweavers

38 search results - page 3 / 8
» sp 1998
Sort
View
SP
1998
IEEE
174views Security Privacy» more  SP 1998»
13 years 11 months ago
On Enabling Secure Applications Through Off-Line Biometric Identification
In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, we study secure off-line...
George I. Davida, Yair Frankel, Brian J. Matt
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
13 years 11 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 11 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
PARA
1998
Springer
13 years 11 months ago
Portable Implementation of Real-Time Signal Processing Benchmarks on HPC Platforms
Abstract. For the evaluation of HPC systems for real-time signal processing, real-time benchmarks have recently been proposed by the US DoD signal processing and HPC communities. F...
Jinwoo Suh, Viktor K. Prasanna
ISPD
1998
ACM
128views Hardware» more  ISPD 1998»
13 years 11 months ago
Topology constrained rectilinear block packing for layout reuse
In this paper, we formulate the problem of topology constrained rectilinear block packing in layout reuse. A speci c class of rectilinear shaped blocks, ordered convex rectilinear...
Maggie Zhiwei Kang, Wayne Wei-Ming Dai