Sciweavers

1016 search results - page 143 / 204
» Explore or Exploit
Sort
View
CCS
2007
ACM
13 years 12 months ago
Improving multi-tier security using redundant authentication
Multi-tier web server systems are used in many important contexts and their security is a major cause of concern. Such systems can exploit strategies like least privilege to make ...
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita...
DEBS
2010
ACM
13 years 11 months ago
Quilt: a patchwork of multicast regions
Network bottlenecks, firewalls, restrictions on IP Multicast availability and administrative policies have long prevented the use of multicast even where the fit seems obvious. ...
Qi Huang, Ymir Vigfusson, Ken Birman, Haoyuan Li
ICC
2007
IEEE
13 years 11 months ago
Interference Handling in UWB Versus 802.11n Networks
Abstract-- UWB and 802.11n have both been touted as technologies for next generation wireless networks. UWB exploiting a large bandwidth, and 802.11n utilizing MIMO, demonstrate hi...
Arjunan Rajeswaran, Gyouhwan Kim, Rohit Negi, Sai ...
CCS
2006
ACM
13 years 11 months ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
EH
2004
IEEE
117views Hardware» more  EH 2004»
13 years 11 months ago
Multi-objective Optimization of a Parameterized VLIW Architecture
The use of Application Specific Instruction-set Processors (ASIP) in embedded systems is a solution to the problem of increasing complexity in the functions these systems have to ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...