Sciweavers

2027 search results - page 330 / 406
» On Performance Evaluation of Face Detection and Localization...
Sort
View
WCNC
2008
IEEE
14 years 3 months ago
Developing Security Solutions for Wireless Mesh Enterprise Networks
—Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...
ACSAC
2006
IEEE
14 years 3 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
SASN
2006
ACM
14 years 3 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
MM
2005
ACM
167views Multimedia» more  MM 2005»
14 years 2 months ago
SensEye: a multi-tier camera sensor network
This paper argues that a camera sensor network containing heterogeneous elements provides numerous benefits over traditional homogeneous sensor networks. We present the design an...
Purushottam Kulkarni, Deepak Ganesan, Prashant J. ...
ICCAD
1993
IEEE
139views Hardware» more  ICCAD 1993»
14 years 1 months ago
Hardware/software resolution of pipeline hazards in pipeline synthesis of instruction set processors
— One major problem in pipeline synthesis is the detection and resolution of pipeline hazards. In this paper we present a new solution to the problem in the domain of pipelined a...
Ing-Jer Huang, Alvin M. Despain