Sciweavers

2503 search results - page 61 / 501
» Building Computer Network Attacks
Sort
View
ECCV
2002
Springer
15 years 11 months ago
Building Roadmaps of Local Minima of Visual Models
Getting trapped in suboptimal local minima is a perennial problem in model based vision, especially in applications like monocular human body tracking where complex nonlinear para...
Cristian Sminchisescu, Bill Triggs
ADHOC
2008
132views more  ADHOC 2008»
14 years 10 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
ICNP
2000
IEEE
15 years 2 months ago
Building a Programmable Multiplexing Service Using Concast
Concast is a scalable “inverse-multicast” network service: messages sent from multiple sources toward the same destination are merged into a single message that is delivered t...
Kenneth L. Calvert, Jim Griffioen, Amit Sehgal, Su...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 4 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao