Sciweavers

1701 search results - page 340 / 341
» Computer Science and State Machines
Sort
View
ACSW
2006
15 years 21 days ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
CORR
2008
Springer
141views Education» more  CORR 2008»
14 years 11 months ago
Model checking memoryful linear-time logics over one-counter automata
We study complexity of the model-checking problems for LTL with registers (also known as freeze LTL and written LTL ) and for first-order logic with data equality tests (written F...
Stéphane Demri, Ranko Lazic, Arnaud Sangnie...
TSMC
2008
116views more  TSMC 2008»
14 years 11 months ago
Fuzzy Techniques for Subjective Workload-Score Modeling Under Uncertainties
This paper deals with the development of a computer model to estimate the subjective workload score of individuals by evaluating their heart-rate (HR) signals. The identification o...
Mohit Kumar, D. Arndt, Steffi Kreuzfeld, Kerstin T...
C3S2E
2010
ACM
14 years 10 months ago
McLab: an extensible compiler toolkit for MATLAB and related languages
MATLAB is a popular language for scientific computation. Effectively compiling MATLAB presents many challenges due to the dynamic nature of the language. We present McLab, an ext...
Andrew Casey, Jun Li, Jesse Doherty, Maxime Cheval...
LISA
2004
15 years 21 days ago
autoMAC: A Tool for Automating Network Moves, Adds, and Changes
It is often difficult and time-consuming to manage computer `moves, adds, and changes' that take place in a switched, subnetted environment. It is even more difficult when th...
Christopher J. Tengi, James M. Roberts, Joseph R. ...