Sciweavers

8177 search results - page 1434 / 1636
» Detecting System Emulators
Sort
View
144
Voted
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 10 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
108
Voted
NCA
2007
IEEE
15 years 10 months ago
A Topological Analysis of Monitor Placement
The Internet is an extremely complex system, and it is essential that we be able to make accurate measurements in order to understand its underlying behavior or to detect improper...
Alden W. Jackson, Walter C. Milliken, Cesar A. San...
RTCSA
2007
IEEE
15 years 10 months ago
Virtual Full Replication by Adaptive Segmentation
We propose Virtual Full Replication by Adaptive segmentation (ViFuR-A), and evaluate its ability to maintain scalability in a replicated real-time database. With full replication ...
Gunnar Mathiason, Sten F. Andler, Sang Hyuk Son
SEMCO
2007
IEEE
15 years 10 months ago
CDIP: Collection-Driven, yet Individuality-Preserving Automated Blog Tagging
With the success of blogs as popular information sharing media, searches on blogs have become popular. In the blogosphere, tagging is used as a means of annotating blog entries wi...
Jong Wook Kim, K. Selçuk Candan, Jun'ichi T...
AIRWEB
2007
Springer
15 years 10 months ago
A Taxonomy of JavaScript Redirection Spam
Redirection spam presents a web page with false content to a crawler for indexing, but automatically redirects the browser to a different web page. Redirection is usually immediat...
Kumar Chellapilla, Alexey Maykov
« Prev « First page 1434 / 1636 Last » Next »