Sciweavers

BWCCA
2010
13 years 7 months ago
Comments on a One-Way Hash Chain Based Authentication for FMIPv6
In this paper, we analyze a one-way hash chain based authentication scheme proposed by Haddad and Krishnan. The authentication scheme has been introduced for improving handover per...
Ilsun You, Jong-Hyouk Lee
BWCCA
2010
13 years 7 months ago
Constructivist Approach to Information Security Awareness in the Middle East
Abstract--This paper studies the application of an approach to enhance information security awareness amongst employees within middleeastern companies, in effort to improve informa...
Mohammed Boujettif, Yongge Wang
BWCCA
2010
13 years 7 months ago
Advanced Design Issues for OASIS Network-on-Chip Architecture
Network-on-Chip (NoC) architectures provide a good way of realizing efficient interconnections and largely alleviate the limitations of bus-based solutions. NoC has emerged as a so...
Kenichi Mori, Adam Esch, Abderazek Ben Abdallah, K...
BWCCA
2010
13 years 7 months ago
Malware Obfuscation Techniques: A Brief Survey
As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores ...
Ilsun You, Kangbin Yim
BIRTHDAY
2010
Springer
13 years 7 months ago
Using Graph Grammars for Modeling Wiring Harnesses - An Experience Report
Albert Zündorf, Leif Geiger, Ralf Gemmerich, ...
BIRTHDAY
2010
Springer
13 years 7 months ago
Approximate String Matching with Reduced Alphabet
Abstract. We present a method to speed up approximate string matching by mapping the factual alphabet to a smaller alphabet. We apply the alphabet reduction scheme to a tuned versi...
Leena Salmela, Jorma Tarhio
COMSIS
2010
13 years 9 months ago
Robust moving object detection under complex background
We present a novel method to robustly and efficiently detect moving object, even under the complexity background, such as illumination changes, long shadows etc. This work is disti...
Ding Ying, Wen-Hui Li, Jing-Tao Fan, Hua-Min Yang
COMPUTER
2010
84views more  COMPUTER 2010»
13 years 9 months ago
When TV Dies, Will It Go to the Cloud?
Karin Breitman, Markus Endler, Rafael Pereira, Mar...
COMGEO
2010
ACM
13 years 9 months ago
Implementing a Bayesian approach to criminal geographic profiling
The geographic profiling problem is to create an operationally useful estimate of the location of the home base of a serial criminal from the known locations of the offense sites....
Mike O'Leary