Sciweavers

6251 search results - page 1060 / 1251
» Randomness, Computability, and Density
Sort
View
ICPADS
2005
IEEE
15 years 10 months ago
On the Connectedness of Peer-to-Peer Overlay Networks
Peer-to-Peer (P2P) applications typically use overlay networks to forward the content queries. However, due to the distributed fashion of the overlay establishment, the overlay ne...
Weisheng Si, MingChu Li
ISCAS
2005
IEEE
133views Hardware» more  ISCAS 2005»
15 years 10 months ago
Multiobjective VLSI cell placement using distributed simulated evolution algorithm
— Simulated Evolution (SimE) is a sound stochastic approximation algorithm based on the principles of adaptation. If properly engineered it is possible for SimE to reach nearopti...
Sadiq M. Sait, Ali Mustafa Zaidi, Mustafa I. Ali
ITCC
2005
IEEE
15 years 10 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...
LCN
2005
IEEE
15 years 10 months ago
On the Server Fairness of Congestion Control in the ISP Edge Router
The Internet Engineering Task Force (IETF) recommended the deployment of Active Queue Management (AQM) in the Internet routers in 1998. There were more than 50 new AQM algorithms ...
Hsien-Ming Wu, Chin-Chi Wu, Woei Lin
MOBIQUITOUS
2005
IEEE
15 years 10 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
« Prev « First page 1060 / 1251 Last » Next »