Sciweavers

2595 search results - page 218 / 519
» Addressing Computational Viewpoint Design
Sort
View
SIGCOMM
2005
ACM
15 years 8 months ago
A DoS-limiting network architecture
We present the design and evaluation of TVA, a network architecture that limits the impact of Denial of Service (DoS) floods from the outset. Our work builds on earlier work on c...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
CHES
2005
Springer
96views Cryptology» more  CHES 2005»
15 years 8 months ago
The "Backend Duplication" Method
Abstract. Several types of logic gates suitable for leakage-proof computations have been put forward [1,2,3,4]. This paper describes a method, called “backend duplication” to a...
Sylvain Guilley, Philippe Hoogvorst, Yves Mathieu,...
ISLPED
2010
ACM
165views Hardware» more  ISLPED 2010»
15 years 2 months ago
Power-efficient directional wireless communication on small form-factor mobile devices
Wireless access is known to be power-hungry for mobile devices. A key reason is that devices radiate power in all directions and much of this power will not reach the destination....
Ardalan Amiri Sani, Hasan Dumanli, Lin Zhong, Ashu...
JUCS
2008
145views more  JUCS 2008»
15 years 2 months ago
Development of Ambient Intelligence Systems Based on Collaborative Task Models
: So far, the Ambient Intelligence (AmI) paradigm has been applied to the development of a great variety of real systems. They use advanced technologies such as ubiquitous computin...
Roberto F. Arroyo, Miguel Gea, José Luis Ga...
EWC
2007
102views more  EWC 2007»
15 years 2 months ago
Interactive collision detection in three-dimensional visualizations of simulated construction operations
This paper presents research that led to the design and implementation of fast and interactive collision detection methods that can be used to identify and report undesirable con...
Vineet R. Kamat, Julio C. Martínez