Sciweavers

549 search results - page 107 / 110
» Updates and Asynchronous Communication in Trusted Computing ...
Sort
View
CCS
2007
ACM
14 years 1 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
VTC
2006
IEEE
14 years 1 months ago
Throughput Performance of Iterative Frequency-Domain SIC with 2D MMSE-FDE for SC-MIMO Multiplexing
— Broadband wireless packet access will be the core technology of the next generation mobile communication systems. For very high-speed and high-quality packet transmissions in a...
Akinori Nakajima, Fumiyuki Adachi
SIGCOMM
2006
ACM
14 years 1 months ago
A measurement study on the impact of routing events on end-to-end internet path performance
Extensive measurement studies have shown that end-to-end Internet path performance degradation is correlated with routing dynamics. However, the root cause of the correlation betw...
Feng Wang, Zhuoqing Morley Mao, Jia Wang, Lixin Ga...
SIGCOMM
2003
ACM
14 years 22 days ago
Towards an accurate AS-level traceroute tool
Traceroute is widely used to detect routing problems, characterize end-to-end paths, and discover the Internet topology. Providing an accurate list of the Autonomous Systems (ASes...
Zhuoqing Morley Mao, Jennifer Rexford, Jia Wang, R...
AAAI
2006
13 years 9 months ago
A Multi Agent Approach to Vision Based Robot Scavenging
This paper proposes a design for our entry into the 2006 AAAI Scavenger Hunt Competition and Robot Exhibition. We will be entering a scalable two agent system consisting of off-th...
Kamil Wnuk, Brian Fulkerson, Jeremi Sudol