Sciweavers

427 search results - page 52 / 86
» Hybrid Soft Computing: Where are we Going
Sort
View
SIGCOMM
2012
ACM
11 years 10 months ago
Multi-resource fair queueing for packet processing
Middleboxes are ubiquitous in today’s networks and perform a variety of important functions, including IDS, VPN, firewalling, and WAN optimization. These functions differ vastl...
Ali Ghodsi, Vyas Sekar, Matei Zaharia, Ion Stoica
EUROCRYPT
2004
Springer
14 years 1 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
IPPS
2008
IEEE
14 years 2 months ago
Immersive real-time large-scale network simulation: A research summary
Immersive real-time large-scale network simulation is a technique that supports simulation of large-scale networks to interact with real implementations of network protocols, netw...
Jason Liu
VTC
2007
IEEE
127views Communications» more  VTC 2007»
14 years 1 months ago
Delay Distribution Analysis of IEEE 802.11 with Variable Packet Length
—The distribution of the delay is a very important measure to determine the performance of a WLAN. Indeed, realtime applications typically require that their packets reach their ...
Paschalis Raptis, Vasileios Vitsas, Albert Banchs,...
ICIP
2000
IEEE
14 years 8 months ago
Combined Dynamic Tracking and Recognition of Curves with Application to Road Detection
We present an algorithm that extracts the largest shape within a specificclass, starting from a set of image edgels. The algorithm inherits the Best-First Segmentation approach [jp...
Frederic Guichard, Jean-Philippe Tarel