Sciweavers

13618 search results - page 2609 / 2724
» The Newton Operating System
Sort
View
153
Voted
WISEC
2009
ACM
15 years 10 months ago
Securing network access in wireless sensor networks
In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In t...
Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas M...
130
Voted
CCS
2009
ACM
15 years 10 months ago
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...
118
Voted
CCS
2009
ACM
15 years 10 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
135
Voted
ICALP
2009
Springer
15 years 10 months ago
Improved Bounds for Speed Scaling in Devices Obeying the Cube-Root Rule
Speed scaling is a power management technique that involves dynamically changing the speed of a processor. This gives rise to dualobjective scheduling problems, where the operating...
Nikhil Bansal, Ho-Leung Chan, Kirk Pruhs, Dmitriy ...
131
Voted
CEC
2009
IEEE
15 years 10 months ago
Evolving coordinated quadruped gaits with the HyperNEAT generative encoding
— Legged robots show promise for complex mobility tasks, such as navigating rough terrain, but the design of their control software is both challenging and laborious. Traditional...
Jeff Clune, Benjamin E. Beckmann, Charles Ofria, R...
« Prev « First page 2609 / 2724 Last » Next »