Sciweavers

1440 search results - page 281 / 288
» Third-Party Flow Control
Sort
View
CCS
2006
ACM
14 years 2 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
AMAST
2008
Springer
14 years 27 days ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
APGV
2008
ACM
193views Visualization» more  APGV 2008»
14 years 27 days ago
Probing dynamic human facial action recognition from the other side of the mean
Insights from human perception of moving faces have the potential to provide interesting insights for technical animation systems as well as in the neural encoding of facial expre...
Cristóbal Curio, Martin A. Giese, Martin Br...
CODES
2005
IEEE
14 years 26 days ago
Hardware/software partitioning of software binaries: a case study of H.264 decode
We describe results of a case study whose intent was to determine whether new techniques for hardware/software partitioning of an application’s binary are competitive with parti...
Greg Stitt, Frank Vahid, Gordon McGregor, Brian Ei...
EUROPAR
2008
Springer
14 years 20 days ago
MPC: A Unified Parallel Runtime for Clusters of NUMA Machines
Over the last decade, Message Passing Interface (MPI) has become a very successful parallel programming environment for distributed memory architectures such as clusters. However, ...
Marc Pérache, Hervé Jourdren, Raymon...