Sciweavers

1170 search results - page 130 / 234
» Between ends and fibers
Sort
View
95
Voted
SECURWARE
2007
IEEE
15 years 6 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
VTC
2007
IEEE
117views Communications» more  VTC 2007»
15 years 6 months ago
On the Coexistence of Overlapping BSSs in WLANs
— In this paper, we investigate the issue of 20/40 MHz coexistence in next generation wireless local area networks (WLAN). To that end, we present simulation results of overlappi...
Ariton E. Xhafa, Anuj Batra, Artur Zaks
WECWIS
2007
IEEE
131views ECommerce» more  WECWIS 2007»
15 years 6 months ago
Event Cloud - Searching for Correlated Business Events
Market players that can respond to critical business events faster than their competitors will end up as winners in the fast moving economy. Event-based systems have been develope...
Szabolcs Rozsnyai, Roland Vecera, Josef Schiefer, ...
INFOCOM
2007
IEEE
15 years 6 months ago
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
ACCV
2007
Springer
15 years 6 months ago
Exploiting Inter-frame Correlation for Fast Video to Reference Image Alignment
Strong temporal correlation between adjacent frames of a video signal has been successfully exploited in standard video compression algorithms. In this work, we show that the tempo...
Arif Mahmood, Sohaib Khan