Sciweavers

5210 search results - page 942 / 1042
» Computing Capabilities of Mediators
Sort
View
ACSAC
2009
IEEE
15 years 5 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
138
Voted
AMFG
2007
IEEE
238views Biometrics» more  AMFG 2007»
15 years 5 months ago
Towards Pose-Invariant 2D Face Classification for Surveillance
A key problem for "face in the crowd" recognition from existing surveillance cameras in public spaces (such as mass transit centres) is the issue of pose mismatches betwe...
Conrad Sanderson, Ting Shan, Brian C. Lovell
CCS
2007
ACM
15 years 5 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
ARITH
2007
IEEE
15 years 5 months ago
A Software Implementation of the IEEE 754R Decimal Floating-Point Arithmetic Using the Binary Encoding Format
The IEEE Standard 754-1985 for Binary Floating-Point Arithmetic [1] was revised [2], and an important addition is the definition of decimal floating-point arithmetic. This is inte...
Marius Cornea, Cristina Anderson, John Harrison, P...
WCNC
2010
IEEE
15 years 5 months ago
Differentiable Spectrum Partition for Fractional Frequency Reuse in Multi-Cell OFDMA Networks
To mitigate inter-cell interference (ICI) and achieve higher spectrum efficiency, fractional frequency reuse (FFR) has been widely adopted by the next generation wireless systems...
Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma P. ...