Sciweavers

8689 search results - page 1569 / 1738
» Software: hard data
Sort
View
SECURWARE
2007
IEEE
14 years 4 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
VTC
2007
IEEE
14 years 4 months ago
HSDPA Measurements for Indoor DAS
—The target of the paper is to study performance of HSDPA in indoor environment, and to provide guidelines for HSDPA coverage and capacity planning and antenna configurations se...
Tero Isotalo, Jukka Lempiäinen
ACCV
2007
Springer
14 years 4 months ago
Fast Optimal Three View Triangulation
We consider the problem of L2-optimal triangulation from three separate views. Triangulation is an important part of numerous computer vision systems. Under gaussian noise, minimiz...
Martin Byröd, Klas Josephson, Kalle Åst...
CC
2007
Springer
143views System Software» more  CC 2007»
14 years 4 months ago
Accurate Garbage Collection in Uncooperative Environments with Lazy Pointer Stacks
Implementing a new programming language by the means of a translator to an existing language is attractive as it provides portability over all platforms supported by the host langu...
Jason Baker, Antonio Cunei, Filip Pizlo, Jan Vitek
CC
2007
Springer
109views System Software» more  CC 2007»
14 years 4 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han
« Prev « First page 1569 / 1738 Last » Next »