Sciweavers

4138 search results - page 791 / 828
» Design and implementation of a network simulation system
Sort
View
277
Voted
GIS
2003
ACM
16 years 4 months ago
Attribute space visualization of demographic change
This paper introduces an approach for closer integration of selforganizing maps into the visualization of spatio-temporal phenomena in GIS. It is proposed to provide a more explic...
André Skupin, Ron Hagelman
130
Voted
VLSID
2004
IEEE
107views VLSI» more  VLSID 2004»
16 years 4 months ago
Performance Analysis of Inter Cluster Communication Methods in VLIW Architecture
With increasing demands for high performance by embedded systems, especially by digital signal processing applications, embedded processors must increase available instruction lev...
Sourabh Saluja, Anshul Kumar
159
Voted
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
120
Voted
ESORICS
2007
Springer
15 years 9 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
136
Voted
MIDDLEWARE
2005
Springer
15 years 9 months ago
Context aware sensornet
Advances in MEMS technology, wireless communications, and digital electronics have enabled the development of low-cost, low-power, multifunctional sensor nodes that integrating th...
Huaifeng Qin, Xingshe Zhou