Sciweavers

135 search results - page 5 / 27
» The case for active device drivers
Sort
View
TRIDENTCOM
2006
IEEE
14 years 1 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
DATE
2010
IEEE
134views Hardware» more  DATE 2010»
14 years 22 days ago
Constrained Power Management: Application to a multimedia mobile platform
—In this paper we provide an overview of CPM, a cross-layer framework for Constrained Power Management, and we present its application on a real use case. This framework involves...
Patrick Bellasi, Stefano Bosisio, Matteo Carnevali...
EUSAI
2004
Springer
14 years 1 months ago
Using Cooperative Artefacts as Basis for Activity Recognition
Ambient intelligent applications require applications to recognise user activity calmly in the background, typically by instrumentation of environments. In contrast, we propose the...
Martin Strohbach, Gerd Kortuem, Hans-Werner Geller...
HICSS
2010
IEEE
276views Biometrics» more  HICSS 2010»
14 years 2 months ago
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
This paper provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15....
Benjamin R. Moyers, John Paul Dunning, Randolph Ma...
TMM
2010
141views Management» more  TMM 2010»
13 years 2 months ago
A Robust Block-Based Image/Video Registration Approach for Mobile Imaging Devices
Digital video stabilization enables to acquire video sequences without disturbing jerkiness by compensating unwanted camera movements. In this paper we propose a novel fast image r...
Sebastiano Battiato, Arcangelo Bruna, Giovanni Pug...