Sciweavers

1225 search results - page 161 / 245
» Process Improvement for Small Organizations
Sort
View
AIMS
2009
Springer
15 years 9 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
HICSS
2000
IEEE
147views Biometrics» more  HICSS 2000»
15 years 8 months ago
ViCA - A WWW based Tool for Visualizing Project Status
Easy-to-access and up-to-date project status feedback is an important aspect of effective project management. When project data is collected, a common problem is how to present th...
Pekka Kilponen, Jari Vanhanen
FPGA
2004
ACM
163views FPGA» more  FPGA 2004»
15 years 8 months ago
Time and area efficient pattern matching on FPGAs
Pattern matching for network security and intrusion detection demands exceptionally high performance. Much work has been done in this field, and yet there is still significant roo...
Zachary K. Baker, Viktor K. Prasanna
CASES
2001
ACM
15 years 8 months ago
Storage allocation for embedded processors
In an embedded system, it is common to have several memory areas with different properties, such as access time and size. An access to a specific memory area is usually restricted...
Jan Sjödin, Carl von Platen
ISMB
2008
15 years 6 months ago
Classification of arrayCGH data using fused SVM
Motivation: Array-based comparative genomic hybridization (arrayCGH) has recently become a popular tool to identify DNA copy number variations along the genome. These profiles are...
Franck Rapaport, Emmanuel Barillot, Jean-Philippe ...