Sciweavers

4330 search results - page 750 / 866
» Analyzing security architectures
Sort
View
107
Voted
ICPADS
2006
IEEE
15 years 9 months ago
Coloring the Internet: IP Traceback
Several IP Traceback schemes employing packet marking have been proposed to trace DoS/DDoS attacks that use source address spoofing. The major challenges in the design of an ef...
Muthusrinivasan Muthuprasanna, G. Manimaran, Manso...
136
Voted
ICSM
2006
IEEE
15 years 9 months ago
Source-Level Linkage: Adding Semantic Information to C++ Fact-bases
Facts extracted from source code have been used to support a variety of software engineering activities, ranging from architectural understanding, through detection of design patt...
Daqing Hou, H. James Hoover
125
Voted
IISWC
2006
IEEE
15 years 9 months ago
MineBench: A Benchmark Suite for Data Mining Workloads
Abstract— Data mining constitutes an important class of scientific and commercial applications. Recent advances in data extraction techniques have created vast data sets, which ...
Ramanathan Narayanan, Berkin Özisikyilmaz, Jo...
101
Voted
ISCAS
2006
IEEE
79views Hardware» more  ISCAS 2006»
15 years 9 months ago
A low-power 64-point FFT/IFFT design for IEEE 802.11a WLAN application
—In this paper, we propose a cost-effective and low-power 64-point fast Fourier transform (FFT)/inverse FFT (IFFT) architecture and chip adopting the retrenched 8-point FFT/IFFT ...
Chin-Teng Lin, Yuan-Chu Yu, Lan-Da Van
88
Voted
ISCAS
2006
IEEE
98views Hardware» more  ISCAS 2006»
15 years 9 months ago
Second order dynamic element matching technique for low oversampling delta sigma ADC
There has been an increased interest in design of that it can give better performance, if a modified noise broadband (data rate >IMSPS) delta sigma ADCs with over- transfer func...
A. K. Gupta, E. Sanchez-Sinencio, S. Karthikeyan, ...