Sciweavers

499 search results - page 11 / 100
» A Study on Latent Vulnerabilities
Sort
View
ICPR
2010
IEEE
14 years 7 months ago
Towards a Better Understanding of the Performance of Latent Fingerprint Recognition in Realistic Forensic Conditions
Abstract-- This work studies the performance of a stateof-the-art fingerprint recognition technology, in several practical scenarios of interest in forensic casework. First, the di...
Maria Puertas, Daniel Ramos, Julian Fiérrez...
NDSS
2009
IEEE
15 years 4 months ago
Recursive DNS Architectures and Vulnerability Implications
DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques...
David Dagon, Manos Antonakakis, Kevin Day, Xiapu L...
CN
2007
80views more  CN 2007»
14 years 9 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
MICRO
2010
IEEE
153views Hardware» more  MICRO 2010»
14 years 7 months ago
AVF Stressmark: Towards an Automated Methodology for Bounding the Worst-Case Vulnerability to Soft Errors
Soft error reliability is increasingly becoming a first-order design concern for microprocessors, as a result of higher transistor counts, shrinking device geometries and lowering ...
Arun A. Nair, Lizy Kurian John, Lieven Eeckhout
ISCA
2012
IEEE
224views Hardware» more  ISCA 2012»
12 years 12 months ago
A first-order mechanistic model for architectural vulnerability factor
Soft error reliability has become a first-order design criterion for modern microprocessors. Architectural Vulnerability Factor (AVF) modeling is often used to capture the probab...
Arun A. Nair, Stijn Eyerman, Lieven Eeckhout, Lizy...