Sciweavers

6393 search results - page 1146 / 1279
» Randomized Algorithms on the Mesh
Sort
View
CHES
2008
Springer
146views Cryptology» more  CHES 2008»
14 years 6 days ago
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration
Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead...
Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhe...
PODC
2010
ACM
14 years 5 days ago
Brief announcement: adaptive content placement for peer-to-peer video-on-demand systems
In this paper, we address the problem of content placement in peer-to-peer systems, with the objective of maximizing the utilization of peers' uplink bandwidth resources. We ...
Bo Tan, Laurent Massoulié
ALGOSENSORS
2007
Springer
14 years 1 days ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
IDA
2010
Springer
14 years 14 hour ago
A Framework for Path-Oriented Network Simplification
Abstract. We propose a generic framework and methods for simplification of large networks. The methods can be used to improve the understandability of a given network, to complemen...
Hannu Toivonen, Sébastien Mahler, Fang Zhou
CLEF
2008
Springer
14 years 10 hour ago
UniNE at Domain-Specific IR - CLEF 2008
Our first objective in participating in this domain-specific evaluation campaign is to propose and evaluate various indexing and search strategies for the German, English and Russ...
Claire Fautsch, Ljiljana Dolamic, Jacques Savoy
« Prev « First page 1146 / 1279 Last » Next »