Sciweavers

683 search results - page 78 / 137
» Unique Group Signatures
Sort
View
OSDI
2004
ACM
16 years 4 days ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
ISCA
2000
IEEE
121views Hardware» more  ISCA 2000»
15 years 4 months ago
Selective, accurate, and timely self-invalidation using last-touch prediction
Communication in cache-coherent distributed shared memory (DSM) often requires invalidating (or writing back) cached copies of a memory block, incurring high overheads. This paper...
An-Chow Lai, Babak Falsafi
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
15 years 3 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...
ECCV
1998
Springer
16 years 1 months ago
Projective and Illumination Invariant Representation of Disjoint Shapes
We describe a new projectively invariant representation of disjoint contour groups which is suitable for shape-based retrieval from an image database. It consists of simultaneous ...
Sergei Startchik, Ruggero Milanese, Thierry Pun
ICASSP
2008
IEEE
15 years 6 months ago
Robust video fingerprints based on subspace embedding
We present a novel video fingerprinting method based on subspace embedding. The proposed method is particularly robust against frame-rate conversion attacks and geometric attacks...
Regunathan Radhakrishnan, Claus Bauer