Sciweavers

2237 search results - page 326 / 448
» On the Security of Random Sources
Sort
View
SADFE
2008
IEEE
15 years 4 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...
ICC
2007
IEEE
245views Communications» more  ICC 2007»
15 years 4 months ago
A Node Recovery Scheme for Data Dissemination in Wireless Sensor Networks
—In wireless sensor networks, sensor nodes are expected to gather specific information about the environment and send it to the user. The data dissemination usually involves many...
Faycal Bouhafs, Madjid Merabti, Hala M. Mokhtar
ICDIM
2007
IEEE
15 years 4 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
OOPSLA
2007
Springer
15 years 4 months ago
Refactoring support for the C++ development tooling
This article reveals our work on refactoring plug-ins for Eclipse’s C++ Development Tooling (CDT). With CDT a reliable open source IDE exists for C/C++ developers. Unfortunately...
Emanuel Graf, Guido Zgraggen, Peter Sommerlad
SAFECOMP
2007
Springer
15 years 4 months ago
Software Encoded Processing: Building Dependable Systems with Commodity Hardware
In future, the decreasing feature size and the reduced power supply will make it much more difficult to built reliable microprocessors. Economic pressure will most likely result in...
Ute Wappler, Christof Fetzer