Sciweavers

5687 search results - page 1032 / 1138
» Visualizing Evaluation in Scheme
Sort
View
IJSN
2007
129views more  IJSN 2007»
13 years 9 months ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...
TC
2008
13 years 9 months ago
Exploiting In-Memory and On-Disk Redundancy to Conserve Energy in Storage Systems
Abstract--Today's storage systems place an imperative demand on energy efficiency. A storage system often places single-rotationrate disks into standby mode by stopping them f...
Jun Wang, Xiaoyu Yao, Huijun Zhu
TCAD
2008
115views more  TCAD 2008»
13 years 9 months ago
Variability-Aware Design of Multilevel Logic Decoders for Nanoscale Crossbar Memories
Abstract--The fabrication of crossbar memories with sublithographic features is expected to be feasible within several emerging technologies; in all of them, the nanowire (NW) deco...
M. Haykel Ben Jamaa, Kirsten E. Moselund, David At...
ADHOC
2004
134views more  ADHOC 2004»
13 years 9 months ago
Scalable team multicast in wireless ad hoc networks exploiting coordinated motion
In this paper, we study a new multicast paradigm for large scale mobile ad hoc networks, namely team multicast. In team multicast the multicast group does not consist of individua...
Yunjung Yi, Mario Gerla, Katia Obraczka
BMCBI
2004
104views more  BMCBI 2004»
13 years 9 months ago
Discriminative topological features reveal biological network mechanisms
Background: Recent genomic and bioinformatic advances have motivated the development of numerous network models intending to describe graphs of biological, technological, and soci...
Manuel Middendorf, Etay Ziv, Carter Adams, Jen Hom...
« Prev « First page 1032 / 1138 Last » Next »