Sciweavers

9305 search results - page 1795 / 1861
» Modeling Blog Dynamics
Sort
View
SERSCISA
2009
Springer
14 years 5 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
SSD
2009
Springer
167views Database» more  SSD 2009»
14 years 5 months ago
Continuous Spatial Authentication
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such app...
Stavros Papadopoulos, Yin Yang, Spiridon Bakiras, ...
ISLPED
2009
ACM
168views Hardware» more  ISLPED 2009»
14 years 5 months ago
Low power circuit design based on heterojunction tunneling transistors (HETTs)
The theoretical lower limit of subthreshold swing in MOSFETs (60 mV/decade) significantly restricts low voltage operation since it results in a low ON to OFF current ratio at low ...
Daeyeon Kim, Yoonmyung Lee, Jin Cai, Isaac Lauer, ...
W4A
2009
ACM
14 years 5 months ago
Audio presentation of auto-suggest lists
One of the most significant advances behind World Wide Web (Web) 2.0 is the ability to allow parts of a Web page to be updated independently. This can provide an exciting, intera...
Andy Brown, Caroline Jay, Simon Harper
PPOPP
2010
ACM
14 years 5 months ago
Thread to strand binding of parallel network applications in massive multi-threaded systems
In processors with several levels of hardware resource sharing, like CMPs in which each core is an SMT, the scheduling process becomes more complex than in processors with a singl...
Petar Radojkovic, Vladimir Cakarevic, Javier Verd&...
« Prev « First page 1795 / 1861 Last » Next »