Sciweavers

1448 search results - page 216 / 290
» Restricted Stack Implementations
Sort
View
ISPAN
2005
IEEE
14 years 1 months ago
P2P Architecture for Self-Atomic Memory
We propose an architecture for self-adjusting and self-healing atomic memory in highly dynamic systems exploiting peer-to-peer (p2p) techniques. Our approach, named SAM, brings to...
Emmanuelle Anceaume, Maria Gradinariu, Vincent Gra...
ACMACE
2005
ACM
14 years 1 months ago
Interactive three-dimensional rendering on mobile computer devices
We present a client/server system that is able to display 3D scenes on handheld devices. This kind of devices have important restrictions of memory and computing power. Therefore,...
Javier Lluch, Rafael Gaitán, Emilio Camahor...
ANCS
2005
ACM
14 years 1 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
SI3D
2005
ACM
14 years 1 months ago
Real-time relief mapping on arbitrary polygonal surfaces
This paper presents a technique for mapping relief textures onto arbitrary polygonal models in real time. In this approach, the mapping of the relief data is done in tangent space...
Fabio Policarpo, Manuel M. Oliveira, João L...
WOWMOM
2005
ACM
165views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks
Recent work on key establishment for sensor networks has shown that it is feasible to employ limited Elliptic Curve Cryptography in sensor networks through hybrid protocols. In th...
Panayiotis Kotzanikolaou, Emmanouil Magkos, Christ...