Sciweavers

2672 search results - page 494 / 535
» Testing Self-Similar Networks
Sort
View
AINA
2009
IEEE
15 years 6 months ago
JPEG Steganography: A Performance Evaluation of Quantization Tables
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
CCS
2009
ACM
15 years 6 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
MICRO
2009
IEEE
124views Hardware» more  MICRO 2009»
15 years 6 months ago
ZerehCache: armoring cache architectures in high defect density technologies
Aggressive technology scaling to 45nm and below introduces serious reliability challenges to the design of microprocessors. Large SRAM structures used for caches are particularly ...
Amin Ansari, Shantanu Gupta, Shuguang Feng, Scott ...
RAID
2009
Springer
15 years 6 months ago
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. pr...
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, ...
IJCNN
2008
IEEE
15 years 6 months ago
Including multi-objective abilities in the Hybrid Intelligent Suite for decision support
— Hybrid intelligent systems (HIS) are very successful in tackling problems comprising of more than one distinct computational subtask. For instance, decision-making problems are...
Diogo Ferreira Pacheco, Flávio R. S. Olivei...