Sciweavers

4435 search results - page 814 / 887
» Networking named content
Sort
View
CCS
2011
ACM
12 years 10 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
ECSCW
2011
12 years 9 months ago
Digital Traces of Interest: Deriving Interest Relationships from Social Media Interactions
Facebook and Twitter have changed the way we consume information, allowing the people we follow to become our “social filters” and determine the content of our information stre...
Michal Jacovi, Ido Guy, Inbal Ronen, Adam Perer, E...
HICSS
2012
IEEE
265views Biometrics» more  HICSS 2012»
12 years 5 months ago
Change and Control Paradoxes in Mobile Infrastructure Innovation: The Android and iOS Mobile Operating Systems Cases
The advent of the smartphone as a highly complex technology has been accompanied by mobile operating systems (OS), large communities of developers, diverse content providers, and ...
David Tilson, Carsten Sørensen, Kalle Lyyti...
SIGCOMM
2005
ACM
14 years 3 months ago
Idle sense: an optimal access method for high throughput and fairness in rate diverse wireless LANs
We consider wireless LANs such as IEEE 802.11 operating in the unlicensed radio spectrum. While their nominal bit rates have increased considerably, the MAC layer remains practica...
Martin Heusse, Franck Rousseau, Romaric Guillier, ...
WWW
2008
ACM
14 years 10 months ago
Anycast CDNS revisited
Because it is an integral part of the Internet routing apparatus, and because it allows multiple instances of the same service to be "naturally" discovered, IP Anycast h...
Hussein A. Alzoubi, Seungjoon Lee, Michael Rabinov...