Sciweavers

13593 search results - page 2581 / 2719
» Performance Analysis of MD5
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...
INFOCOM
2006
IEEE
15 years 10 months ago
A Compound TCP Approach for High-Speed and Long Distance Networks
—Many applications require fast data transfer over high speed and long distance networks. However, standard TCP fails to fully utilize the network capacity due to the limitation ...
Kun Tan, Jingmin Song, Qian Zhang, Murari Sridhara...
IROS
2006
IEEE
107views Robotics» more  IROS 2006»
15 years 10 months ago
Image Mapping and Visual Attention on a Sensory Ego-Sphere
Abstract— The Sensory Ego-Sphere (SES) is a short-term memory for a robot in the form of an egocentric, tessellated, spherical, sensory-motor map of the robot’s locale. This pa...
Katherine Achim Fleming, Richard Alan Peters II, R...
ISPASS
2006
IEEE
15 years 10 months ago
Considering all starting points for simultaneous multithreading simulation
Commercial processors have support for Simultaneous Multithreading (SMT), yet little work has been done to provide representative simulation results for SMT. Given a workload, cur...
Michael Van Biesbrouck, Lieven Eeckhout, Brad Cald...
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 10 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
« Prev « First page 2581 / 2719 Last » Next »