Sciweavers

2120 search results - page 85 / 424
» Mapping the Gnutella Network
Sort
View
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 11 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
GLVLSI
2009
IEEE
126views VLSI» more  GLVLSI 2009»
15 years 8 months ago
An efficient cut enumeration for depth-optimum technology mapping for LUT-based FPGAs
Recent technology mappers for LUT based FPGAs employ cut enumeration. Although many cuts are often needed to nd good network, enumerating all cuts with large size consumes run-tim...
Taiga Takata, Yusuke Matsunaga
ICCAD
1994
IEEE
131views Hardware» more  ICCAD 1994»
15 years 8 months ago
Edge-map: optimal performance driven technology mapping for iterative LUT based FPGA designs
We consider the problem of performance driven lookup-table (LUT) based technology mapping for FPGAs using a general delay model. In the general delay model, each interconnection e...
Hannah Honghua Yang, D. F. Wong
SOCIALCOM
2010
15 years 2 months ago
The Many Faces of Mentoring in an MMORPG
Mentoring refers to the phenomenon where a more skilled or knowledgeable person helps a less skilled or less knowledgeable person gain skill in a particular domain. In this paper w...
Muhammad Aurangzeb Ahmad, David Huffaker, Jing Wan...
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 10 months ago
An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks
— Mobile users are expected to be highly dynamic in next generation mobile networks. Additionally they will be served a wide variety of services with different transmission rates...
Tarik Taleb, Yuji Ikeda, Kazuo Hashimoto, Yoshiaki...