Sciweavers

1518 search results - page 274 / 304
» Cryptographic Test Correction
Sort
View
92
Voted
ACSAC
2006
IEEE
15 years 6 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
TRIDENTCOM
2006
IEEE
15 years 6 months ago
The utility of perceptive communication between distant wireless nodes
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
CASES
2006
ACM
15 years 6 months ago
Mitigating soft error failures for multimedia applications by selective data protection
With advances in process technology, soft errors (SE) are becoming an increasingly critical design concern. Due to their large area and high density, caches are worst hit by soft ...
Kyoungwoo Lee, Aviral Shrivastava, Ilya Issenin, N...
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 6 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
MOBICOM
2006
ACM
15 years 6 months ago
Robust rate adaptation for 802.11 wireless networks
Rate adaptation is a mechanism unspecified by the 802.11 standards, yet critical to the system performance by exploiting the multi-rate capability at the physical layer. In this ...
Starsky H. Y. Wong, Songwu Lu, Hao Yang, Vaduvur B...