Sciweavers

92 search results - page 5 / 19
» Design space and analysis of worm defense strategies
Sort
View
90
Voted
GLOBECOM
2010
IEEE
14 years 7 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
ANSS
2003
IEEE
15 years 3 months ago
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb...
CHI
2003
ACM
15 years 10 months ago
When one isn't enough: an analysis of virtual desktop usage strategies and their implications for design
Screen space is a limited resource for computer users-multiple monitors are one means of workspace expansion, and "virtual desktops" are yet another way to increase scre...
Meredith Ringel
DAC
2003
ACM
15 years 10 months ago
Using estimates from behavioral synthesis tools in compiler-directed design space exploration
This paper considers the role of performance and area estimates from behavioral synthesis in design space exploration. We have developed a compilation system that automatically ma...
Byoungro So, Pedro C. Diniz, Mary W. Hall
69
Voted
ASPDAC
2005
ACM
89views Hardware» more  ASPDAC 2005»
14 years 11 months ago
System-level design space exploration for security processor prototyping in analytical approaches
— The customization of architectures in designing the security processor-based systems typically involves timeconsuming simulation and sophisticated analysis in the exploration o...
Yung-Chia Lin, Chung-Wen Huang, Jenq Kuen Lee