Sciweavers

1029 search results - page 114 / 206
» An Architecture for Problem Solving with Diagrams
Sort
View
IJSN
2010
148views more  IJSN 2010»
13 years 7 months ago
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
: This paper investigates authentication and secure data retrieval issues in Radio-Frequency IDentification (RFID)-aware wireless sensor networks. We propose a network architecture...
Shih-I Huang, Shiuhpyng Shieh
DAC
2001
ACM
14 years 9 months ago
Performance-Driven Multi-Level Clustering with Application to Hierarchical FPGA Mapping
In this paper, we study the problem of performance-driven multi-level circuit clustering with application to hierarchical FPGA designs. We first show that the performance-driven m...
Jason Cong, Michail Romesis
ICSE
2009
IEEE-ACM
14 years 3 months ago
Software Engineering for the Next Internet
The Internet no longer meets the world’s requirements. Recognition of the Internet architecture’s inherent flaws has opened a window of opportunity for fresh thinking: granti...
Pamela Zave
AINA
2006
IEEE
14 years 2 months ago
Efficient Packet Matching for Gigabit Network Intrusion Detection using TCAMs
Ternary content-addressable memories (TCAMs) have gained wide acceptance in the industry for storing and searching patterns in routers. But two important problems block the way to...
Ming Gao, Kenong Zhang, Jiahua Lu
IPPS
2000
IEEE
14 years 1 months ago
Autonomous Consistency Technique in Distributed Database with Heterogeneous Requirements
Recently, the diversified types of companies have been trying to cooperate among them to cope with the dynamic market and thus integration of their DBs with heterogeneous requirem...
Hideo Hanamura, Isao Kaji, Kinji Mori