Sciweavers

1897 search results - page 2 / 380
» Early application identification
Sort
View
ACSAC
2002
IEEE
13 years 9 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
ICCAD
1996
IEEE
121views Hardware» more  ICCAD 1996»
13 years 9 months ago
Identification of unsettable flip-flops for partial scan and faster ATPG
State justification is a time-consuming operation in test generation for sequential circuits. In this paper, we present a technique to rapidly identify state elements (flip-flops)...
Ismed Hartanto, Vamsi Boppana, W. Kent Fuchs
CASES
2006
ACM
13 years 8 months ago
Power efficient branch prediction through early identification of branch addresses
Ever increasing performance requirements have elevated deeply pipelined architectures to a standard even in the embedded processor domain, requiring the incorporation of dynamic b...
Chengmo Yang, Alex Orailoglu
HASE
2007
IEEE
13 years 11 months ago
A Nonparametric Cusum Algorithm for Timeslot Sequences with Applications to Network Surveillance
We adapt the classic cusum change-point detection algorithm for applications to data network monitoring where various and numerous performance and reliability metrics are availabl...
Qi Zhang, Carlos Rendón, Veronica Montes De...
HICSS
2007
IEEE
151views Biometrics» more  HICSS 2007»
13 years 11 months ago
Strategic and Institutional Perspectives in the Adoption and Early Integration of Radio Frequency Identification (RFID)
Using multiple lenses of strategic choice theories (diffusion of innovation, organizational innovativeness) and institutional theory as the basis and reflecting data from semi-str...
Aditya Sharma, Alex Citurs, Benn R. Konsynski