Sciweavers

11172 search results - page 2081 / 2235
» Testing Physical Systems
Sort
View
149
Voted
ICDAR
2011
IEEE
14 years 3 months ago
Lexicon-Free, Novel Segmentation of Online Handwritten Indic Words
—Research in the field of recognizing unlimited vocabulary, online handwritten Indic words is still in its infancy. Most of the focus so far has been in the area of isolated cha...
Suresh Sundaram, A. G. Ramakrishnan
ICDCSW
2011
IEEE
14 years 3 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
126
Voted
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 11 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
HPCA
2012
IEEE
13 years 11 months ago
Pacman: Tolerating asymmetric data races with unintrusive hardware
Data races are a major contributor to parallel software unreliability. A type of race that is both common and typically harmful is the Asymmetric data race. It occurs when at leas...
Shanxiang Qi, Norimasa Otsuki, Lois Orosa Nogueira...
149
Voted
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
15 years 10 months ago
Binding Now or Binding Later: The Performance of UDDI Registries
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...
« Prev « First page 2081 / 2235 Last » Next »