Sciweavers

35419 search results - page 6887 / 7084
» How are we doing
Sort
View
ISCA
2008
IEEE
142views Hardware» more  ISCA 2008»
15 years 10 months ago
Improving NAND Flash Based Disk Caches
Flash is a widely used storage device that provides high density and low power, appealing properties for general purpose computing. Today, its usual application is in portable spe...
Taeho Kgil, David Roberts, Trevor N. Mudge
ITNG
2008
IEEE
15 years 10 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
LCN
2008
IEEE
15 years 10 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
NOMS
2008
IEEE
105views Communications» more  NOMS 2008»
15 years 10 months ago
Characterization of IP flows eligible for lambda-connections in optical networks
Abstract—The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and opt...
Tiago Fioreze, Mattijs Oude Wolbers, Remco van de ...
PIMRC
2008
IEEE
15 years 10 months ago
The limits of theory: Pragmatic challenges in mobile ad hoc systems
—The development of mobile ad hoc systems have considerably emphasized the need for a better understanding of the factors that influence the systems’ performance, i.e., mobili...
Franck Legendre, Martin May, Vincent Lenders, Gunn...
« Prev « First page 6887 / 7084 Last » Next »