Sciweavers

416 search results - page 34 / 84
» Some new approaches for preventing software tampering
Sort
View
COMCOM
2008
91views more  COMCOM 2008»
14 years 11 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
CVPR
2000
IEEE
16 years 1 months ago
Scene Constraints-Aided Tracking of Human Body
This paper describes a new method for tracking of a human body in 3D motion by using constraints imposed on the body from the scene. An image-based approach for tracking exclusive...
Masanobu Yamamoto, Katsutoshi Yagishita
CSL
2007
Springer
15 years 5 months ago
A Cut-Free and Invariant-Free Sequent Calculus for PLTL
Abstract. Sequent calculi usually provide a general deductive setting that uniformly embeds other proof-theoretical approaches, such as tableaux methods, resolution techniques, goa...
Joxe Gaintzarain, Montserrat Hermo, Paqui Lucio, M...
106
Voted
INFOCOM
2006
IEEE
15 years 5 months ago
On Hybrid Collision Control for IEEE 802.11 Ad-Hoc Networks
— We present in this work a new mechanism based on an innovative hybrid approach for traffic and collision control in wireless ad hoc networks. We combine the well known equatio...
Hicham Khalife
92
Voted
ACSAC
2000
IEEE
15 years 4 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti