Sciweavers

8177 search results - page 488 / 1636
» Detecting System Emulators
Sort
View
IMC
2004
ACM
15 years 10 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
HICSS
2010
IEEE
276views Biometrics» more  HICSS 2010»
15 years 11 months ago
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15....
Benjamin R. Moyers, John Paul Dunning, Randolph Ma...
IOLTS
2006
IEEE
84views Hardware» more  IOLTS 2006»
15 years 10 months ago
An Improved Technique for Reducing False Alarms Due to Soft Errors
A significant fraction of soft errors in modern microprocessors has been reported to never lead to a system failure. Any concurrent error detection scheme that raises alarm every ...
Sandip Kundu, Ilia Polian
FGR
2002
IEEE
185views Biometrics» more  FGR 2002»
15 years 9 months ago
Hand Gesture Recognition using Multi-Scale Colour Features, Hierarchical Models and Particle Filtering
This paper presents algorithms and a prototype system for hand tracking and hand posture recognition. Hand postures are represented in terms of hierarchies of multi-scale colour i...
Lars Bretzner, Ivan Laptev, Tony Lindeberg
ASP
2001
Springer
15 years 9 months ago
Answer Set Programming and Bounded Model Checking
In this paper bounded model checking of asynchronous concurrent systems is introduced as a promising application area for answer set programming. This is an extension of earlier w...
Keijo Heljanko, Ilkka Niemelä