Sciweavers

9105 search results - page 247 / 1821
» Design of the MUC-6 evaluation
Sort
View
IPCCC
2006
IEEE
15 years 5 months ago
Risk reduction based survivable WDM network design
— This paper presents an investment strategy to reduce the risk associated with failures in Wavelength Division Multiplexing (WDM) optical networks. The investment strategy deter...
K. Vajanapoom, David Tipper
IWIA
2005
IEEE
15 years 4 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
CHES
2005
Springer
170views Cryptology» more  CHES 2005»
15 years 4 months ago
Design of Testable Random Bit Generators
Abstract. In this paper, the evaluation of random bit generators for security applications is discussed and the concept of stateless generator is introduced. It is shown how, for t...
Marco Bucci, Raimondo Luzzi
DCOSS
2005
Springer
15 years 4 months ago
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications
Abstract. Many sensor network applications demand tightly-bounded object detection quality. To meet such stringent requirements, we develop three sensing scheduling protocols to gu...
Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
15 years 4 months ago
Designs for Ramp-Constrained Day-Ahead Auctions
— Some electric power markets allow bidders to specify constraints on ramp rates for increasing or decreasing power production. We show in a small example that a bidder could use...
Shmuel S. Oren, Andrew M. Ross