Sciweavers

2432 search results - page 408 / 487
» Cryptographic logical relations
Sort
View
CCS
2011
ACM
14 years 4 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
ISCA
2012
IEEE
279views Hardware» more  ISCA 2012»
13 years 6 months ago
Staged memory scheduling: Achieving high performance and scalability in heterogeneous systems
When multiple processor (CPU) cores and a GPU integrated together on the same chip share the off-chip main memory, requests from the GPU can heavily interfere with requests from t...
Rachata Ausavarungnirun, Kevin Kai-Wei Chang, Lava...
176
Voted
TMC
2012
13 years 6 months ago
Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks
—Backoff misbehavior, in which a wireless node deliberately manipulates its backoff time, can induce significant network problems, such as severe unfairness and denial-of-servic...
Zhuo Lu, Wenye Wang, Cliff Wang
TMC
2012
13 years 6 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
CVPR
2005
IEEE
16 years 6 months ago
Statistical Cue Integration for Foveated Wide-Field Surveillance
Reliable detection of human activity is an unsolved problem. The main is that low resolution and the unconstrained nature of realistic environments and human behaviourmakeform cue...
Simon J. D. Prince, James H. Elder, Yuqian Hou, Mi...