Sciweavers

5799 search results - page 1146 / 1160
» Health-OS: : a position paper
Sort
View
RAID
2005
Springer
14 years 3 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
TACAS
2005
Springer
108views Algorithms» more  TACAS 2005»
14 years 3 months ago
On Some Transformation Invariants Under Retiming and Resynthesis
Transformations using retiming and resynthesis operations are the most important and practical (if not the only) techniques used in optimizing synchronous hardware systems. Althoug...
Jie-Hong Roland Jiang
CCS
2005
ACM
14 years 3 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
ISPD
2004
ACM
134views Hardware» more  ISPD 2004»
14 years 3 months ago
Performance-driven register insertion in placement
As the CMOS technology is scaled into the dimension of nanometer, the clock frequencies and die sizes of ICs are shown to be increasing steadily [5]. Today, global wires that requ...
Dennis K. Y. Tong, Evangeline F. Y. Young
MIR
2004
ACM
109views Multimedia» more  MIR 2004»
14 years 3 months ago
A web-enabled video indexing system
Video parsing and indexing is an important early stage of contentbased video analysis. In this paper, we present a new web-enabled video indexing system that integrates Synchroniz...
Jian Zhou, Xiao-Ping Zhang
« Prev « First page 1146 / 1160 Last » Next »