Sciweavers

1777 search results - page 334 / 356
» Programming Cryptographic Protocols
Sort
View
ETS
2000
IEEE
113views Hardware» more  ETS 2000»
13 years 8 months ago
NetChat: Communication and Collaboration via WWW
Practice has shown that providing content to students alone is not sufficient for good learning results. In computer based training (CBT) and especially webbased training (WBT) en...
Reinhard Kreutz, Sven Kiesow, Klaus Spitzer
INFOCOM
2010
IEEE
13 years 7 months ago
Leaping Multiple Headers in a Single Bound: Wire-Speed Parsing Using the Kangaroo System
—More fundamental than IP lookups and packet classification in routers is the extraction of fields such as IP Dest and TCP Ports that determine packet forwarding. While parsing...
Christos Kozanitis, John Huber, Sushil Singh, Geor...
BMCBI
2011
13 years 3 months ago
Removing Noise From Pyrosequenced Amplicons
Background: In many environmental genomics applications a homologous region of DNA from a diverse sample is first amplified by PCR and then sequenced. The next generation sequenci...
Christopher Quince, Anders Lanzén, Russell ...
WICOMM
2011
13 years 3 months ago
A pragmatic approach to area coverage in hybrid wireless sensor networks
Success of Wireless Sensor Networks (WSN) largely depends on whether the deployed network can provide desired area coverage with acceptable network lifetime. This paper seeks to a...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
ISCA
2011
IEEE
238views Hardware» more  ISCA 2011»
13 years 9 days ago
Rebound: scalable checkpointing for coherent shared memory
As we move to large manycores, the hardware-based global checkpointing schemes that have been proposed for small shared-memory machines do not scale. Scalability barriers include ...
Rishi Agarwal, Pranav Garg, Josep Torrellas