Sciweavers

2635 search results - page 411 / 527
» System Area Network Mapping
Sort
View
ITICSE
1996
ACM
14 years 1 months ago
Scientific visualization - some novel approaches to learning
Scientific visualization is becoming an important part of the curriculum in a number of disciplines. It is a very practical subject, but the commercially available visualization s...
Ken Brodlie, Jason Wood, Helen Wright
INFOCOM
1992
IEEE
14 years 1 months ago
A Study on the Inaccessibility Characteristics of ISO 8802/4 Token-Bus LANs
Local area networks have long been established as the basis for distributed systems. Continuity of service and bounded and known message delivery latency are requirements of a num...
José Rufino, Paulo Veríssimo
CANS
2009
Springer
132views Cryptology» more  CANS 2009»
14 years 1 months ago
Fully Robust Tree-Diffie-Hellman Group Key Exchange
We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
Timo Brecher, Emmanuel Bresson, Mark Manulis
GLOBECOM
2009
IEEE
14 years 1 months ago
Joint Channel and Echo Impulse Response Shortening for High-Speed Data Transmission
The unit-norm constraint optimization for joint shortening of channel and echo impulse response is presented in this paper. The optimization is performed in the mean-square sense (...
Ali Enteshari, Jarir M. Fadlullah, Mohsen Kavehrad
ICCS
2007
Springer
14 years 1 months ago
Combining Classifiers for Web Violent Content Detection and Filtering
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Radhouane Guermazi, Mohamed Hammami, Abdelmajid Be...