Sciweavers

8177 search results - page 485 / 1636
» Detecting System Emulators
Sort
View
CMS
2010
150views Communications» more  CMS 2010»
15 years 5 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
FPGA
2010
ACM
232views FPGA» more  FPGA 2010»
15 years 5 months ago
High-throughput bayesian computing machine with reconfigurable hardware
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
Mingjie Lin, Ilia Lebedev, John Wawrzynek
TIT
2002
118views more  TIT 2002»
15 years 4 months ago
Cayley differential unitary space - Time codes
One method for communicating with multiple antennas is to encode the transmitted data differentially using unitary matrices at the transmitter, and to decode differentially withou...
Babak Hassibi, Bertrand M. Hochwald
ANCS
2010
ACM
15 years 2 months ago
sNICh: efficient last hop networking in the data center
: sNICh: Efficient Last Hop Networking in the Data Center Kaushik Kumar Ram, Jayaram Mudigonda, Alan L. Cox, Scott Rixner, Partha Ranganathan, Jose Renato Santos HP Laboratories H...
Kaushik Kumar Ram, Jayaram Mudigonda, Alan L. Cox,...
CONEXT
2010
ACM
15 years 2 months ago
Enabling high-bandwidth vehicular content distribution
Abstract -- We present VCD, a novel system for enabling high-bandwidth content distribution in vehicular networks. In VCD, a vehicle opportunistically communicates with nearby acce...
Upendra Shevade, Yi-Chao Chen, Lili Qiu, Yin Zhang...