Sciweavers

857 search results - page 103 / 172
» Will this paper ever be cited
Sort
View
JSSPP
2009
Springer
14 years 2 months ago
Competitive Two-Level Adaptive Scheduling Using Resource Augmentation
Abstract. As multi-core processors proliferate, it has become more important than ever to ensure efficient execution of parallel jobs on multiprocessor systems. In this paper, we s...
Hongyang Sun, Yangjie Cao, Wen-Jing Hsu
MIDDLEWARE
2009
Springer
14 years 2 months ago
MANETKit: Supporting the Dynamic Deployment and Reconfiguration of Ad-Hoc Routing Protocols
The innate dynamicity and complexity of mobile ad-hoc networks (MANETs) has resulted in numerous ad-hoc routing protocols being proposed. Furthermore, numerous variants and hybrids...
Rajiv Ramdhany, Paul Grace, Geoff Coulson, David H...
NBIS
2009
Springer
14 years 2 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
CANDC
2009
ACM
14 years 2 months ago
Musicomputation: teaching computer science to teenage musicians
While algorithms have existed in math, music and other fields for over one thousand years, the use of algorithms to solve problems has become easier than ever before due to the a...
Adam L. Meyers, Marilyn C. Cole, Evan Korth, Sam P...
AINA
2008
IEEE
14 years 2 months ago
Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System
—Network Intrusion Detection System (NIDS) is a system developed for identifying attacks by using a set of rules. NIDS is an efficient way to provide the security protection for ...
Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung