Sciweavers

430 search results - page 78 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
ICCAD
1994
IEEE
91views Hardware» more  ICCAD 1994»
14 years 2 days ago
A loosely coupled parallel algorithm for standard cell placement
We present a loosely coupled parallel algorithm for the placement of standard cell integrated circuits. Our algorithm is a derivative of simulated annealing. The implementation of...
Wern-Jieh Sun, Carl Sechen
MM
2003
ACM
118views Multimedia» more  MM 2003»
14 years 1 months ago
PROMISE: peer-to-peer media streaming using CollectCast
We present the design, implementation, and evaluation of PROMISE, a novel peer-to-peer media streaming system encompassing the key functions of peer lookup, peer-based aggregated ...
Mohamed Hefeeda, Ahsan Habib, Boyan Botev, Dongyan...
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 9 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
JSAC
2011
142views more  JSAC 2011»
13 years 2 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
NAR
2011
216views Computer Vision» more  NAR 2011»
12 years 10 months ago
ChemProt: a disease chemical biology database
Systems pharmacology is an emergent area that studies drug action across multiple scales of complexity, from molecular and cellular to tissue and organism levels. There is a criti...
Olivier Taboureau, Sonny Kim Nielsen, Karine Audou...