Sciweavers

796 search results - page 106 / 160
» Spoofing prevention method
Sort
View
3DIM
2005
IEEE
14 years 3 months ago
Gaussian Scale-Space Dense Disparity Estimation with Anisotropic Disparity-Field Diffusion
We present a new reliable dense disparity estimation algorithm which employs Gaussian scale-space with anisotropic disparity-field diffusion. This algorithm estimates edge-preserv...
Jangheon Kim, Thomas Sikora
CCGRID
2005
IEEE
14 years 3 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
DSN
2005
IEEE
14 years 3 months ago
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security att...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
HPCA
2005
IEEE
14 years 3 months ago
Heat Stroke: Power-Density-Based Denial of Service in SMT
In the past, there have been several denial-of-service (DOS) attacks which exhaust some shared resource (e.g., physical memory, process table, file descriptors, TCP connections) ...
Jahangir Hasan, Ankit Jalote, T. N. Vijaykumar, Ca...
ICALT
2005
IEEE
14 years 3 months ago
Predicting Students' Marks in Hellenic Open University
The ability to provide assistance for a student at the appropriate level is invaluable in the learning process. Not only does it aid the student’s learning process but also prev...
Sotiris B. Kotsiantis, Panayiotis E. Pintelas