Sciweavers

3883 search results - page 689 / 777
» Design mentoring based on design evolution analysis
Sort
View
ML
2010
ACM
155views Machine Learning» more  ML 2010»
15 years 2 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
RFIDSEC
2010
15 years 2 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
SPRINGSIM
2010
15 years 2 months ago
Using factored bond graphs for distributed diagnosis of physical systems
This paper presents a distributed Bayesian fault diagnosis scheme for physical systems. Our diagnoser design is based on a procedure for factoring the global system bond graph (BG...
Indranil Roychoudhury, Gautam Biswas, Xenofon D. K...
TASLP
2010
123views more  TASLP 2010»
15 years 2 months ago
Plane-Wave Decomposition of Acoustical Scenes Via Spherical and Cylindrical Microphone Arrays
Spherical and cylindrical microphone arrays offer a number of attractive properties such as direction-independent acoustic behavior and ability to reconstruct the sound field in ...
Dmitry N. Zotkin, Ramani Duraiswami, Nail A. Gumer...
TELSYS
2010
122views more  TELSYS 2010»
15 years 2 months ago
Transmission scheduling for multi-homed transport protocols with network failure tolerance
In heterogeneous network environments, the network connections of a multi-homed device may have significant bandwidth differential. For a multihomed transmission protocol designed ...
Yuansong Qiao, Enda Fallon, John Murphy, Liam Murp...