Sciweavers

75 search results - page 10 / 15
» Potential Fire Detection based on Kalman-driven Change Detec...
Sort
View
TRUST
2010
Springer
15 years 2 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
DAC
1994
ACM
15 years 1 months ago
Fitting Formal Methods into the Design Cycle
This tutorial introduces several methods of formal hardware veri cation that could potentially have a practical impact on the design process. The measure of success in integrating...
Kenneth L. McMillan
ACL
2009
14 years 7 months ago
The Contribution of Stylistic Information to Content-based Mobile Spam Filtering
Content-based approaches to detecting mobile spam to date have focused mainly on analyzing the topical aspect of a SMS message (what it is about) but not on the stylistic aspect (...
Dae-Neung Sohn, Jung-Tae Lee, Hae-Chang Rim
CGF
2010
106views more  CGF 2010»
14 years 9 months ago
Alleviating the Modifiable Areal Unit Problem within Probe-Based Geospatial Analyses
We present a probe-based interface for the exploration of the results of a geospatial simulation of urban growth. Because our interface allows the user great freedom in how they c...
Thomas Butkiewicz, Ross K. Meentemeyer, Douglas A....
ETFA
2006
IEEE
15 years 1 months ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron