Sciweavers

12 search results - page 2 / 3
» Very Fast Containment of Scanning Worms
Sort
View
TELSYS
2010
147views more  TELSYS 2010»
13 years 3 days ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
DFT
2003
IEEE
100views VLSI» more  DFT 2003»
13 years 10 months ago
Scan-Based BIST Diagnosis Using an Embedded Processor
For system-on-chip designs that contain an embedded processor, this paper present a software based diagnosis scheme that can make use of the processor to aid in diagnosis in a sca...
Kedarnath J. Balakrishnan, Nur A. Touba
ISM
2005
IEEE
128views Multimedia» more  ISM 2005»
13 years 11 months ago
Local Shape Association Based Retrieval of Infrared Satellite Images
— This paper presents a shape-based retrieval system and its application to infrared satellite images. A complete system is presented, from region extraction of a full hemisphere...
Aiyesha Ma, Ishwar K. Sethi
ADBIS
2003
Springer
204views Database» more  ADBIS 2003»
13 years 9 months ago
Hierarchical Bitmap Index: An Efficient and Scalable Indexing Technique for Set-Valued Attributes
Abstract. Set-valued attributes are convenient to model complex objects occurring in the real world. Currently available database systems support the storage of set-valued attribut...
Mikolaj Morzy, Tadeusz Morzy, Alexandros Nanopoulo...
ICDE
1998
IEEE
124views Database» more  ICDE 1998»
13 years 9 months ago
Compressing Relations and Indexes
We propose a new compression algorithm that is tailored to database applications. It can be applied to a collection of records, and is especially e ective for records with many lo...
Jonathan Goldstein, Raghu Ramakrishnan, Uri Shaft