Sciweavers

495 search results - page 89 / 99
» Capacity of Non-Malleable Codes
Sort
View
HAIS
2010
Springer
14 years 13 days ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
MSE
2000
IEEE
174views Hardware» more  MSE 2000»
14 years 10 hour ago
Integrating a Digital Camera in the Home Environment: Architecture and Prototype
Electronic photography is gaining parts of the photography market and tends to replace gradually all argentic photography. The combination of digital camera and computer technolog...
Nadia Bennani
MICRO
1998
IEEE
129views Hardware» more  MICRO 1998»
13 years 12 months ago
A Bandwidth-efficient Architecture for Media Processing
Media applications are characterized by large amounts of available parallelism, little data reuse, and a high computation to memory access ratio. While these characteristics are p...
Scott Rixner, William J. Dally, Ujval J. Kapasi, B...
ICC
2007
IEEE
146views Communications» more  ICC 2007»
13 years 11 months ago
Downlink MIMO Systems Using Cooperation Among Base Stations in a Slow Fading Channel
To increase the achievable sum rate of downlink MIMO (Multiple Input Multiple Output) systems, the cooperation among Base Stations (BS) is investigated in a slow fading channel. Th...
Tsuyoshi Tamaki, Kibeom Seong, John M. Cioffi
ICC
2007
IEEE
152views Communications» more  ICC 2007»
13 years 11 months ago
Characterizing and Exploiting Partial Interference in Wireless Mesh Networks
Abstract-- In evaluating the performance of a wireless network, the interference between wireless links plays a key role. In previous works, interference was assumed to be a binary...
Ka-Hung Hui, Wing Cheong Lau, On-Ching Yue