Sciweavers

3343 search results - page 642 / 669
» Network Objects
Sort
View
CCS
2007
ACM
14 years 4 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
ICIP
2003
IEEE
14 years 11 months ago
Spline-based boundary loss concealment
Object-based video coding requires the transmission of the object shape. This shape is sent as a binary a-plane. In lossy packetbased networks, such as the Internet, this informat...
Guido M. Schuster, Xiaohuan Li, Aggelos K. Katsagg...
SIGCOMM
2005
ACM
14 years 3 months ago
Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs
We consider wireless LANs such as IEEE 802.11 operating in the unlicensed radio spectrum. While their nominal bit rates have increased considerably, the MAC layer remains practica...
Martin Heusse, Franck Rousseau, Romaric Guillier, ...
KIVS
2005
Springer
14 years 3 months ago
Globale Referenzen basierend auf SOAP
Abstract: SOAP wurde als leichtgewichtiges Protokoll zum Austausch von strukturierten Informationen in einer verteilten Umgebung konzipiert und bildet so die Basis der ” Web Serv...
Gerhard Austaller, Eric Roth
PETRA
2009
ACM
14 years 4 months ago
Ambient kitchen: designing situated services using a high fidelity prototyping environment
The Ambient Kitchen is a high fidelity prototype for exploring the design of pervasive computing algorithms and applications for everyday environments. The environment integrates ...
Patrick Olivier, Guangyou Xu, Andrew Monk, Jesse H...