Sciweavers

1445 search results - page 148 / 289
» Architectures to make Simple Visualisations using Simple Sys...
Sort
View
JOCN
2011
68views more  JOCN 2011»
13 years 3 months ago
Dissociating Linguistic and Task-related Activity in the Left Inferior Frontal Gyrus
■ The left inferior frontal gyrus (LIFG) has long been claimed to play a key role in language function. However, there is considerable controversy as to whether regions within L...
Paul Wright, Billi Randall, William D. Marslen-Wil...
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
14 years 3 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
WWW
2009
ACM
14 years 9 months ago
Anycast-aware transport for content delivery networks
Anycast-based content delivery networks (CDNs) have many properties that make them ideal for the large scale distribution of content on the Internet. However, because routing chan...
Zakaria Al-Qudah, Seungjoon Lee, Michael Rabinovic...
MOBIHOC
2005
ACM
14 years 8 months ago
Interference-aware topology control and QoS routing in multi-channel wireless mesh networks
The throughput of wireless networks can be significantly improved by multi-channel communications compared with single-channel communications since the use of multiple channels ca...
Jian Tang, Guoliang Xue, Weiyi Zhang
CCS
2009
ACM
14 years 3 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...