Sciweavers

183 search results - page 14 / 37
» Security Analysis and Configuration of Large Networks
Sort
View
CODES
2005
IEEE
14 years 1 months ago
High-level synthesis for large bit-width multipliers on FPGAs: a case study
In this paper, we present the analysis, design and implementation of an estimator to realize large bit width unsigned integer multiplier units. Larger multiplier units are require...
Gang Quan, James P. Davis, Siddhaveerasharan Devar...
MOBIHOC
2008
ACM
14 years 7 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
SPW
1999
Springer
13 years 12 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
CASES
2003
ACM
14 years 25 days ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
ICPR
2002
IEEE
14 years 8 months ago
Face Detection Using a Modified Radial Basis Function Neural Network
Face detection from cluttered images is very challenging due to the diverse variation of face appearance and the complexity of image background. In this paper, we propose a neural...
Lin-Lin Huang, Akinobu Shimizu, Hidefumi Kobatake