Sciweavers

2526 search results - page 244 / 506
» A Comparative Evaluation of Name-Matching Algorithms
Sort
View
FPL
2010
Springer
129views Hardware» more  FPL 2010»
15 years 2 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
GLOBECOM
2010
IEEE
15 years 2 months ago
Prolonging Network Lifetime via a Controlled Mobile Sink in Wireless Sensor Networks
In this paper we explore the mobility of a mobile sink in a wireless sensor network (WSN) to prolong the network lifetime. Since the mechanical movement of mobile sink is driven by...
Weifa Liang, Jun Luo, Xu Xu
INFOCOM
2010
IEEE
15 years 2 months ago
Efficient Continuous Scanning in RFID Systems
RFID is an emerging technology with many potential applications such as inventory management for supply chain. In practice, these applications often need a series of continuous sca...
Bo Sheng, Qun Li, Weizhen Mao
SECON
2010
IEEE
15 years 2 months ago
Multiple Access Mechanisms with Performance Guarantees for Ad-Hoc Networks
This paper bears on the design and the quantitative evaluation of MAC mechanisms for wireless ad-hoc networks with performance guarantees. By this, we mean mechanisms where each ac...
Paola Bermolen, François Baccelli
TMA
2010
Springer
183views Management» more  TMA 2010»
15 years 2 months ago
Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers
In the last few years the research community has proposed several techniques for network traffic classification. While the performance of these methods is promising especially for ...
Alessandro Finamore, Michela Meo, Dario Rossi, Sil...