Sciweavers

6318 search results - page 1229 / 1264
» Data Leakage Detection
Sort
View
ICCD
1997
IEEE
94views Hardware» more  ICCD 1997»
15 years 2 months ago
Pseudo-Random Pattern Testing of Bridging Faults
: This paper studies pseudo-random pattern testing of bridging faults. Although bridging faults are generally more random pattern testable than stuck-at faults, examples are shown ...
Nur A. Touba, Edward J. McCluskey
ECCV
1994
Springer
15 years 1 months ago
Integration and Control of Reactive Visual Processes
This paper describes a new approach to the integration and control of continuously operating visual processes. Visual processes are expressed as transformations which map signals ...
James L. Crowley, Jean Marc Bedrune, Morten Bekker...
SP
1989
IEEE
15 years 1 months ago
Security Issues in Policy Routing
Routing mechanisms for inter-autonomousregion communication require distribution of policy-sensitive information as well as algorithms that operate on such information. Without su...
Deborah Estrin, Gene Tsudik
ANCS
2007
ACM
15 years 1 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
COMSWARE
2007
IEEE
15 years 1 months ago
Efficient Design of End-to-End Probes for Source-Routed Networks
Migration to a converged network has caused service providers to deploy real time applications such as voice over an IP (VoIP) network. From the provider's perspective, the s...
Srinivasan Parthasarathya, Rajeev Rastogi, Marina ...
« Prev « First page 1229 / 1264 Last » Next »