Sciweavers

799 search results - page 126 / 160
» Improving the feasibility pump
Sort
View
ECEASST
2010
14 years 6 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
JCIT
2010
111views more  JCIT 2010»
14 years 6 months ago
Shunt APF Based on Current Loop Repetitive Control
Three-phase shunt active power filter (APF) is often used to compensate the harmonic and reactive current derived from non-linear load. But many non-ideal factors, such as the lim...
Xueliang Wei
JDCTA
2010
150views more  JDCTA 2010»
14 years 6 months ago
A Knowledge Recommend System Based on User Model
The content and searching method of knowledge base are lack of the consideration of user requirements, it is difficult for the user to select the knowledge satisfy with the user r...
Jiagen Sheng, Sifeng Liu
TCOS
2010
14 years 6 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
TELSYS
2010
154views more  TELSYS 2010»
14 years 6 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert