Sciweavers

7741 search results - page 1485 / 1549
» Security in Active Networks
Sort
View
COCOON
2011
Springer
14 years 3 months ago
Finding Paths with Minimum Shared Edges
Motivated by a security problem in geographic information systems, we study the following graph theoretical problem: given a graph G, two special nodes s and t in G, and a number k...
Masoud T. Omran, Jörg-Rüdiger Sack, Hami...
CSE
2011
IEEE
14 years 3 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...
NETGAMES
2006
ACM
15 years 10 months ago
Cheat detection for MMORPG on P2P environments
In recent years, MMORPG has become popular. In order to improve scalability of game system, several P2P-based architectures have been proposed. However, in P2P-based gaming archit...
Takato Izaiku, Shinya Yamamoto, Yoshihiro Murata, ...
BSN
2009
IEEE
149views Sensor Networks» more  BSN 2009»
15 years 11 months ago
Optimizing Interval Training Protocols Using Data Mining Decision Trees
— Interval training consists of interl intensity exercises with rest periods. This training well known exercise protocol which helps stre improve one’s cardiovascular fitness. ...
Myung-kyung Suh, Mahsan Rofouei, Ani Nahapetian, W...
ICDE
2006
IEEE
206views Database» more  ICDE 2006»
16 years 5 months ago
Query Co-Processing on Commodity Hardware
The rapid increase in the data volumes for the past few decades has intensified the need for high processing power for database and data mining applications. Researchers have acti...
Anastassia Ailamaki, Naga K. Govindaraju, Dinesh M...
« Prev « First page 1485 / 1549 Last » Next »