Sciweavers

222 search results - page 9 / 45
» Performance Impact of Addressing Modes on Encryption Algorit...
Sort
View
JMLR
2010
198views more  JMLR 2010»
13 years 2 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
IPPS
2007
IEEE
14 years 2 months ago
Effects of Replica Placement Algorithms on Performance of structured Overlay Networks
In DHT-based P2P systems, Replication-based content distribution and load balancing strategies consists of such decisions as which files should be replicated, how many replicas sh...
Bassam A. Alqaralleh, Chen Wang, Bing Bing Zhou, A...
WCNC
2010
IEEE
13 years 11 months ago
DCP-EW: Distributed Congestion-Control Protocol for Encrypted Wireless Networks
Abstract— VCP suffers from a relatively low speed of convergence and exhibits biased fairness in moderate bandwidth high delay networks due to utilizing an insufficient amount o...
Xiaolong Li, Homayoun Yousefi'zadeh
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 3 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
JUCS
2006
112views more  JUCS 2006»
13 years 7 months ago
A Multi-objective Genetic Approach to Mapping Problem on Network-on-Chip
Abstract: Advances in technology now make it possible to integrate hundreds of cores (e.g. general or special purpose processors, embedded memories, application specific components...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi