Sciweavers

1931 search results - page 298 / 387
» A BitTorrent Performance Evaluation Framework
Sort
View
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 1 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
ICC
2007
IEEE
152views Communications» more  ICC 2007»
14 years 27 days ago
Characterizing and Exploiting Partial Interference in Wireless Mesh Networks
Abstract-- In evaluating the performance of a wireless network, the interference between wireless links plays a key role. In previous works, interference was assumed to be a binary...
Ka-Hung Hui, Wing Cheong Lau, On-Ching Yue
ARC
2006
Springer
157views Hardware» more  ARC 2006»
14 years 23 days ago
PISC: Polymorphic Instruction Set Computers
We introduce a new paradigm in the computer architecture referred to as Polymorphic Instruction Set Computers (PISC). This new paradigm, in difference to RISC/CISC, introduces hard...
Stamatis Vassiliadis, Georgi Kuzmanov, Stephan Won...
ECCV
2010
Springer
14 years 13 days ago
Optimal Contour Closure by Superpixel Grouping
Abstract. Detecting contour closure, i.e., finding a cycle of disconnected contour fragments that separates an object from its background, is an important problem in perceptual gro...
MOBISYS
2010
ACM
13 years 11 months ago
Docx2Go: collaborative editing of fidelity reduced documents on mobile devices
Docx2Go is a new framework to support editing of shared documents on mobile devices. Three high-level requirements influenced its design -- namely, the need to adapt content, espe...
Krishna P. N. Puttaswamy, Catherine C. Marshall, V...