Sciweavers

996 search results - page 164 / 200
» Component-based Face Detection
Sort
View
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 5 months ago
TCP HandOff: A Practical TCP Enhancement for Heterogeneous Mobile Environments
— In recent years, many different kinds of wireless access networks have been deployed for the Internet and have become inseparable parts of the Internet. But TCP, the most widel...
Xiuchao Wu, Mun Choon Chan, Akkihebbal L. Ananda
IEEEPACT
2007
IEEE
14 years 5 months ago
JudoSTM: A Dynamic Binary-Rewriting Approach to Software Transactional Memory
With the advent of chip-multiprocessors, we are faced with the challenge of parallelizing performance-critical software. Transactional memory (TM) has emerged as a promising progr...
Marek Olszewski, Jeremy Cutler, J. Gregory Steffan
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
14 years 5 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
DSN
2005
IEEE
14 years 4 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
MOBICOM
2004
ACM
14 years 4 months ago
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently comp...
Atul Adya, Paramvir Bahl, Ranveer Chandra, Lili Qi...