Sciweavers

2503 search results - page 187 / 501
» Building Computer Network Attacks
Sort
View
107
Voted
ANCS
2009
ACM
14 years 11 months ago
EINIC: an architecture for high bandwidth network I/O on multi-core processors
This paper proposes a new server architecture EINIC (Enhanced Integrated NIC) for multi-core processors to tackle the mismatch between network speed and host computational capacit...
Guangdeng Liao, Laxmi N. Bhuyan, Danhua Guo, Steve...
IJCNN
2006
IEEE
15 years 8 months ago
A Very Small Chaotic Neural Net
— Previously we have shown that chaos can arise in networks of physically realistic neurons [1], [2]. Those networks contain a moderate to large number of units connected in a sp...
Carlos Lourenco
ICIP
2009
IEEE
16 years 2 months ago
Fuzzy Perceptual Watermarking For Ownership Verification
- An adaptive watermarking method based on the human visual system model and the fuzzy inference system in wavelet domain is proposed. Fuzzy logic is used for data fusion and build...
Frederick C. Harris Jr., Mukesh Motwani
128
Voted
EUC
2008
Springer
15 years 3 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
CCS
2009
ACM
15 years 8 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...