Sciweavers

2503 search results - page 74 / 501
» Building Computer Network Attacks
Sort
View
EENERGY
2010
15 years 1 months ago
Policy-driven distributed and collaborative demand response in multi-domain commercial buildings
Enabling a sophisticated Demand Response (DR) framework, whereby individual consumers adapt their electricity consumption in response to price variations, is a major objective of ...
Archan Misra, Henning Schulzrinne
SAC
2006
ACM
15 years 3 months ago
Building the functional performance model of a processor
In this paper, we present an efficient procedure for building a piecewise linear function approximation of the speed function of a processor with hierarchical memory structure. Th...
Alexey L. Lastovetsky, Ravi Reddy, Robert Higgins
VRML
1999
ACM
15 years 2 months ago
JubilEasy: Build a Personalized 3D Visit of Rome
Many tourist web sites nowadays offer the possibility to preview the places you are going to visit. In our project (JubilEasy) we want to offer to all persons wishing to come to R...
Marco Schaerf, Alessandro Tessicini
IPPS
2006
IEEE
15 years 3 months ago
Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks
By violating MAC-layer protocols, the jamming attack aims at blocking successful communication among wireless nodes. Wireless sensor networks (WSNs) are highly vulnerable to jammi...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
ICISC
2008
113views Cryptology» more  ICISC 2008»
14 years 11 months ago
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
Hardware implementations of cryptographic algorithms are still vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of the same operatio...
Svetla Nikova, Vincent Rijmen, Martin Schläff...