Sciweavers

1576 search results - page 223 / 316
» Periodic Merging Networks
Sort
View
ACSAC
2010
IEEE
14 years 1 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
IROS
2009
IEEE
142views Robotics» more  IROS 2009»
15 years 4 months ago
Phoneme acquisition model based on vowel imitation using Recurrent Neural Network
- A phoneme-acquisition system was developed using a computational model that explains the developmental process of human infants in the early period of acquiring language. There a...
Hisashi Kanda, Tetsuya Ogata, Toru Takahashi, Kazu...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
15 years 4 months ago
Gate planning during placement for gated clock network
Abstract— Clock gating is a popular technique for reducing power dissipation in clock network. Although there have been numerous research efforts on clock gating, the previous ap...
Weixiang Shen, Yici Cai, Xianlong Hong, Jiang Hu
ICC
2007
IEEE
139views Communications» more  ICC 2007»
15 years 4 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 3 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...