Sciweavers

2503 search results - page 338 / 501
» Building Computer Network Attacks
Sort
View
ICDCS
1996
IEEE
15 years 5 months ago
Group Routing without Group Routing Tables
We present a group routing protocol for a network of processes. The task of the protocol is to route data messages to each member of a process group. To this end, a tree of proces...
Jorge Arturo Cobb, Mohamed G. Gouda
IPPS
1996
IEEE
15 years 5 months ago
Kiloprocessor Extensions to SCI
To expand the Scalable Coherent Interface's (SCI) capabilities so it can be used to efficiently handle sharing in systems of hundreds or even thousands of processors, the SCI...
Stefanos Kaxiras
ICDIM
2007
IEEE
15 years 5 months ago
Exploiting contextual handover information for versatile services in NGN environments
Users in ubiquitous and pervasive computing environments will be much more empowered in ways to access and to control their navigation. Handover, the vital event in which a user c...
Edson dos Santos Moreira, David N. Cottingham, Jon...
ECCV
2004
Springer
15 years 5 months ago
Efficient Initialization for Constrained Active Surfaces, Applications in 3D Medical Images
A novel method allowing simplified and efficient active surface initialization for 3D images segmentation is presented. Our method allows to initialize an active surface through si...
Roberto Ardon, Laurent D. Cohen
107
Voted
CONEXT
2007
ACM
15 years 5 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...