Sciweavers

11949 search results - page 2215 / 2390
» Some results on (a:b)-choosability
Sort
View
SOUPS
2010
ACM
15 years 5 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
SP
2010
IEEE
327views Security Privacy» more  SP 2010»
15 years 5 months ago
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
– With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split...
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang
SP
2010
IEEE
192views Security Privacy» more  SP 2010»
15 years 5 months ago
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
—Captchas are designed to be easy for humans but hard for machines. However, most recent research has focused only on making them hard for machines. In this paper, we present wha...
Elie Bursztein, Steven Bethard, Celine Fabry, John...
DATE
2009
IEEE
155views Hardware» more  DATE 2009»
15 years 5 months ago
Automatically mapping applications to a self-reconfiguring platform
The inherent reconfigurability of SRAM-based FPGAs enables the use of configurations optimized for the problem at hand. Optimized configurations are smaller and faster than their g...
Karel Bruneel, Fatma Abouelella, Dirk Stroobandt
WCNC
2010
IEEE
15 years 5 months ago
Frequency Reuse Techniques for Attaining Both Coverage and High Spectral Efficiency in OFDMA Cellular Systems
—Inter-cell interference (ICI) is always a big obstacle to attain wide area coverage and high spectral efficiency in cellular systems. In this work we make a study of two well-kn...
Zheng Xie, Bernhard Walke
« Prev « First page 2215 / 2390 Last » Next »