Sciweavers

4511 search results - page 501 / 903
» Observation Based System Security
Sort
View
WMASH
2004
ACM
15 years 10 months ago
LOCATOR: location estimation system For wireless LANs
With the wide spread growth of mobile computing devices and local area wireless networks, wireless network providers have started to target the users with value-added services bas...
Ankur Agiwal, Parakram Khandpur, Huzur Saran
VLSID
2005
IEEE
285views VLSI» more  VLSID 2005»
16 years 5 months ago
Power Monitors: A Framework for System-Level Power Estimation Using Heterogeneous Power Models
Abstract--Power analysis early in the design cycle is critical for the design of lowpower systems. With the move to system-level specifications and design methodologies, there has ...
Nikhil Bansal, Kanishka Lahiri, Anand Raghunathan,...
136
Voted
VLSISP
2002
114views more  VLSISP 2002»
15 years 4 months ago
Adaptive Interference Suppression for the Downlink of a Direct Sequence CDMA System with Long Spreading Sequences
A simple approach for adaptive interference suppression for the downlink (base-to-mobile link) of a direct sequence (DS) based cellular communication system is presented. The base ...
Colin D. Frank, Eugene Visotsky, Upamanyu Madhow
129
Voted
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 11 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
CASES
2005
ACM
15 years 7 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...