Sciweavers

2663 search results - page 18 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
RTAS
2005
IEEE
14 years 29 days ago
VPN Gateways over Network Processors: Implementation and Evaluation
Networking applications, such as VPN and content filtering, demand extra computing power in order to meet the throughput requirement nowadays. In addition to pure ASIC solutions, ...
Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-C...
IV
1998
IEEE
95views Visualization» more  IV 1998»
13 years 11 months ago
Evaluating Three-Dimensional Information Visualization Designs: A Case Study of Three Designs
A number of three-dimensional information visualization designs have been invented during the last years. However, comparisons of such designs have been scarce, making it di cult ...
Ulrika Wiss, David A. Carr, Håkan Jonsson
CHES
2010
Springer
187views Cryptology» more  CHES 2010»
13 years 8 months ago
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)
The power of side-channel leakage attacks on cryptographic implementations is evident. Today's practical defenses are typically attack-specific countermeasures against certain...
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
CHES
2003
Springer
146views Cryptology» more  CHES 2003»
13 years 11 months ago
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs
Abstract. Performance evaluation of the Advanced Encryption Standard candidates has led to intensive study of both hardware and software implementations. However, although plentifu...
François-Xavier Standaert, Gaël Rouvro...
CONEXT
2008
ACM
13 years 9 months ago
TDM MAC protocol design and implementation for wireless mesh networks
We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multihop wireless mesh networks using a programmable wireless platform. E...
Dimitrios Koutsonikolas, Theodoros Salonidis, Henr...