Sciweavers

272 search results - page 42 / 55
» Realizing the performance potential of the virtual interface...
Sort
View
ICNP
2006
IEEE
14 years 2 months ago
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
— In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to t...
Jakob Eriksson, Srikanth V. Krishnamurthy, Michali...
CHI
2011
ACM
13 years 9 days ago
Tweets from Justin Bieber's heart: the dynamics of the location field in user profiles
Little research exists on one of the most common, oldest, and most utilized forms of online social geographic information: the “location” field found in most virtual community...
Brent Hecht, Lichan Hong, Bongwon Suh, Ed H. Chi
ANCS
2007
ACM
14 years 22 days ago
Ruler: high-speed packet matching and rewriting on NPUs
Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide ...
Tomas Hruby, Kees van Reeuwijk, Herbert Bos
AICCSA
2006
IEEE
102views Hardware» more  AICCSA 2006»
14 years 14 days ago
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling
Poor memory management leads to memory leaks, which cause significant performance degradation and failure of software. If ignored, such leaks can potentially cause security breach...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
GLVLSI
2009
IEEE
154views VLSI» more  GLVLSI 2009»
14 years 3 months ago
Design of a maximum-likelihood detector for cooperative communications in intersymbol interference channels
Recently, cooperative communication has attracted a lot of attention for its potential to increase spatial diversity. However, limited attention has been paid to the physical laye...
Yanjie Peng, Andrew G. Klein, Xinming Huang