Sciweavers

1701 search results - page 340 / 341
» Computer Science and State Machines
Sort
View
116
Voted
ACSW
2006
15 years 2 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
122
Voted
CORR
2008
Springer
141views Education» more  CORR 2008»
15 years 1 months ago
Model checking memoryful linear-time logics over one-counter automata
We study complexity of the model-checking problems for LTL with registers (also known as freeze LTL and written LTL ) and for first-order logic with data equality tests (written F...
Stéphane Demri, Ranko Lazic, Arnaud Sangnie...
97
Voted
TSMC
2008
116views more  TSMC 2008»
15 years 1 months ago
Fuzzy Techniques for Subjective Workload-Score Modeling Under Uncertainties
This paper deals with the development of a computer model to estimate the subjective workload score of individuals by evaluating their heart-rate (HR) signals. The identification o...
Mohit Kumar, D. Arndt, Steffi Kreuzfeld, Kerstin T...
137
Voted
C3S2E
2010
ACM
15 years 3 days ago
McLab: an extensible compiler toolkit for MATLAB and related languages
MATLAB is a popular language for scientific computation. Effectively compiling MATLAB presents many challenges due to the dynamic nature of the language. We present McLab, an ext...
Andrew Casey, Jun Li, Jesse Doherty, Maxime Cheval...
LISA
2004
15 years 2 months ago
autoMAC: A Tool for Automating Network Moves, Adds, and Changes
It is often difficult and time-consuming to manage computer `moves, adds, and changes' that take place in a switched, subnetted environment. It is even more difficult when th...
Christopher J. Tengi, James M. Roberts, Joseph R. ...