Sciweavers

1874 search results - page 304 / 375
» Network optimization for DHT-based applications
Sort
View
129
Voted
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 6 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
132
Voted
EDBTW
2006
Springer
15 years 6 months ago
Data Stream Sharing
Abstract. Recent research efforts in the fields of data stream processing and data stream management systems (DSMSs) show the increasing importance of processing data streams, e. g...
Richard Kuntschke, Alfons Kemper
118
Voted
EENERGY
2010
15 years 6 months ago
Policy-driven distributed and collaborative demand response in multi-domain commercial buildings
Enabling a sophisticated Demand Response (DR) framework, whereby individual consumers adapt their electricity consumption in response to price variations, is a major objective of ...
Archan Misra, Henning Schulzrinne
132
Voted
AHSWN
2006
148views more  AHSWN 2006»
15 years 2 months ago
Geometric Chemotaxis: A Biologically-Inspired Framework for a Class of Wireless Coverage Problems
Abstract-- We present a new, biologically-inspired algorithm for the problem of covering a given region with wireless "units" (sensors or base-stations). The general prob...
Hidayet Ozgur Sanli, Rahul Simha, Bhagirath Naraha...
125
Voted
PODC
2010
ACM
15 years 6 months ago
Finding mobile data under delay constraints with searching costs
A token is hidden in one of several boxes and then the boxes are locked. The probability of placing the token in each of the boxes is known. A searcher is looking for the token by...
Amotz Bar-Noy, Panagiotis Cheilaris, Yi Feng 0002,...