Sciweavers

983 search results - page 100 / 197
» Negative-Weight Cycle Algorithms
Sort
View
HAIS
2010
Springer
15 years 5 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
INFOCOM
2000
IEEE
15 years 5 months ago
Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks
Abstract—We introduce and analyze CARMA-MC (for Collision Avoidance and Resolution Multiple Access MultiChannel), a new stable channel access protocol for multihop wireless netwo...
Rodrigo Garcés, J. J. Garcia-Luna-Aceves
ISLPED
1995
ACM
122views Hardware» more  ISLPED 1995»
15 years 4 months ago
A multiple clocking scheme for low power RTL design
This paper presents an e ective multiple clocking scheme for lower power RTL circuit design. The basis is to partition a behavioral description of the circuit into m modules fed b...
Christos A. Papachristou, Mark Spining, Mehrdad No...
ASPDAC
2008
ACM
88views Hardware» more  ASPDAC 2008»
15 years 3 months ago
REWIRED - Register Write Inhibition by Resource Dedication
We propose REWIRED (REgister Write Inhibition by REsource Dedication), a technique for reducing power during high level synthesis (HLS) by selectively inhibiting the storage of fun...
Pushkar Tripathi, Rohan Jain, Srikanth Kurra, Pree...
DCOSS
2008
Springer
15 years 2 months ago
Efficient Node Discovery in Mobile Wireless Sensor Networks
Energy is one of the most crucial aspects in real deployments of mobile sensor networks. As a result of scarce resources, the duration of most real deployments can be limited to ju...
Vladimir Dyo, Cecilia Mascolo