Sciweavers

2195 search results - page 367 / 439
» Prototyping Networked Embedded Systems
Sort
View
SRDS
2008
IEEE
15 years 9 months ago
An Empirical Study of Denial of Service Mitigation Techniques
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
DSN
2007
IEEE
15 years 9 months ago
User Discrimination through Structured Writing on PDAs
This paper explores whether features of structured writing can serve to discriminate users of handheld devices such as Palm PDAs. Biometric authentication would obviate the need t...
Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Kill...
DSN
2007
IEEE
15 years 9 months ago
Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance
Transient faults are emerging as a critical concern in the reliability of general-purpose microprocessors. As architectural trends point towards multi-threaded multi-core designs,...
Alex Shye, Tipp Moseley, Vijay Janapa Reddi, Josep...
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 9 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
IPPS
2006
IEEE
15 years 9 months ago
A framework for developing distributed location based applications
Location based services and applications are buzzwords nowadays, yet they have been around for quite some time in a variety of applications. However these applications are scarce ...
Andrej Krevl, Mojca Ciglaric