Sciweavers

22193 search results - page 3987 / 4439
» Multiple Restricted Multiplication
Sort
View
WS
2006
ACM
15 years 11 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
ACSAC
2005
IEEE
15 years 10 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
AINA
2005
IEEE
15 years 10 months ago
A Single-Computer Grid Gateway Using Virtual Machines
Grid middleware is enabling resource sharing between computing centres across the world and sites with existing clusters are eager to connect to the Grid. However, the hardware re...
Stephen Childs, Brian A. Coghlan, David O'Callagha...
145
Voted
AVSS
2005
IEEE
15 years 10 months ago
Stereo person tracking with short and long term plan-view appearance models of shape and color
Copyright 2005 IEEE. Published in the 2005 International Conference on Advanced Video and Signal-based Surveillance (AVSS-2005), September 15-16, 2005, Como, Italy. Personal use o...
Michael Harville
BROADNETS
2005
IEEE
15 years 10 months ago
Multi-rate throughput optimization for wireless local area network anomaly problem
— Due to varying wireless channel conditions, the IEEE 802.11 wireless local area network (WLAN) standard supports multiple modulation types to accommodate the tradeoff between d...
Yu-Liang Kuo, Kun-Wei Lai, Frank Yeong-Sung Lin, Y...
« Prev « First page 3987 / 4439 Last » Next »