Sciweavers

2410 search results - page 352 / 482
» Multiset Ordering Constraints
Sort
View
ACSAC
2006
IEEE
15 years 11 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
AICT
2006
IEEE
108views Communications» more  AICT 2006»
15 years 11 months ago
A Framework for Quality-Driven Delivery in Distributed Multimedia Systems
In this paper, we propose a framework for QualityDriven Delivery (QDD) in distributed multimedia environments. Quality-driven delivery refers to the capacity of a system to delive...
Brigitte Kerhervé, Kim Khoa Nguyen, Olivier...
DATE
2006
IEEE
87views Hardware» more  DATE 2006»
15 years 11 months ago
Supporting task migration in multi-processor systems-on-chip: a feasibility study
With the advent of multi-processor systems-on-chip, the interest in process migration is again on the rise both in research and in product development. New challenges associated w...
Stefano Bertozzi, Andrea Acquaviva, Davide Bertozz...
127
Voted
DFT
2006
IEEE
74views VLSI» more  DFT 2006»
15 years 11 months ago
Recovery Mechanisms for Dual Core Architectures
Dual core architectures are commonly used to establish fault tolerance on the node level. Since comparison is usually performed for the outputs only, no precise diagnostic informa...
Christian El Salloum, Andreas Steininger, Peter Tu...
GLOBECOM
2006
IEEE
15 years 11 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...