Sciweavers

2631 search results - page 267 / 527
» Less is More
Sort
View
ACSAC
2009
IEEE
15 years 10 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
ICPP
2008
IEEE
15 years 10 months ago
Dynamic Meta-Learning for Failure Prediction in Large-Scale Systems: A Case Study
Despite great efforts on the design of ultra-reliable components, the increase of system size and complexity has outpaced the improvement of component reliability. As a result, fa...
Jiexing Gu, Ziming Zheng, Zhiling Lan, John White,...
PDP
2008
IEEE
15 years 10 months ago
Privacy Protection in Context Transfer Protocol
In the future 4G wireless networks will span across different administrative domains. In order to provide secure seamless handovers in such an environment the Context Transfer Pro...
Giorgos Karopoulos, Georgios Kambourakis, Stefanos...
ISVLSI
2006
IEEE
129views VLSI» more  ISVLSI 2006»
15 years 10 months ago
Dependability Analysis of Nano-scale FinFET circuits
FinFET technology has been proposed as a promising alternative for deep sub-micro bulk CMOS technology, because of its better scalability. Previous work have studied the performan...
Feng Wang 0004, Yuan Xie, Kerry Bernstein, Yan Luo
ICMCS
2005
IEEE
100views Multimedia» more  ICMCS 2005»
15 years 9 months ago
A Fast Frame-Accurate H.264/MPEG-4 AVC Editing Method
H.264/MPEG-4 AVC has become widely used in various applications and services because of its high coding efficiency. With the spread of H.264/MPEG-4 AVC contents, it has been stron...
Akio Yoneyama, Yasuhiro Takishima, Yasuyuki Nakaji...