Sciweavers

48 search results - page 8 / 10
» Redundancy and information leakage in fine-grained access co...
Sort
View
WOWMOM
2005
ACM
195views Multimedia» more  WOWMOM 2005»
14 years 8 days ago
Exploiting MAC Flexibility in WiMAX for Media Streaming
The IEEE 802.16 standard (commonly known as WiMAX) which has emerged as a broadband wireless access technology, is capable of delivering very high data rates. However, providing p...
Shamik Sengupta, Mainak Chatterjee, Samrat Ganguly...
IPPS
1999
IEEE
13 years 11 months ago
Optimizing Irregular HPF Applications using Halos
This paper presents language features for High Performance Fortran HPF to specify non-local access patterns of distributed arrays, called halos, and to control the communication as...
Siegfried Benkner
MICRO
2000
IEEE
176views Hardware» more  MICRO 2000»
13 years 6 months ago
An Advanced Optimizer for the IA-64 Architecture
level of abstraction, compared with the program representation for scalar optimizations. For example, loop unrolling and loop unrolland-jam transformations exploit the large regist...
Rakesh Krishnaiyer, Dattatraya Kulkarni, Daniel M....
ECRIME
2007
13 years 10 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
CCS
2011
ACM
12 years 6 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...