Sciweavers

8177 search results - page 1438 / 1636
» Detecting System Emulators
Sort
View
ACSAC
2006
IEEE
15 years 10 months ago
A Framework for a Collaborative DDoS Defense
Increasing use of the Internet for critical services makes flooding distributed denial-of-service (DDoS) a top security threat. A distributed nature of DDoS suggests that a distr...
George C. Oikonomou, Jelena Mirkovic, Peter L. Rei...
AINA
2006
IEEE
15 years 10 months ago
Simulation Architecture for Data Processing Algorithms in Wireless Sensor Networks
Abstract— Wireless sensor networks, by providing an unprecedented way of interacting with the physical environment, have become a hot topic for research over the last few years. ...
Yann-Aël Le Borgne, Mehdi Moussaid, Gianluca ...
163
Voted
AIPR
2006
IEEE
15 years 10 months ago
Recovering Spheres from 3D Point Data
The National Institute of Standards and Technology is involved in developing standard protocols for the performance evaluation of 3D imaging systems, which include laser scanners ...
Christoph Witzgall, Geraldine S. Cheok, Anthony J....
112
Voted
DFT
2006
IEEE
120views VLSI» more  DFT 2006»
15 years 10 months ago
On-Line Mapping of In-Field Defects in Image Sensor Arrays
Continued increase in complexity of digital image sensors means that defects are more likely to develop in the field, but little concrete information is available on in-field defe...
Jozsef Dudas, Cory Jung, Linda Wu, Glenn H. Chapma...
ICEBE
2006
IEEE
115views Business» more  ICEBE 2006»
15 years 10 months ago
From Commodity to Value: A Privacy-Preserving e-Business Architecture
Privacy has been recognized as a very important issue in electronic commerce. However, many privacy techniques were not adopted and many online anonymity services failed. In this ...
Yitao Duan, John F. Canny
« Prev « First page 1438 / 1636 Last » Next »