Sciweavers

66 search results - page 3 / 14
» A Design of a Next Generation IX using MPLS Technology
Sort
View
ACSAC
2000
IEEE
13 years 10 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
DAC
1996
ACM
13 years 10 months ago
RTL Emulation: The Next Leap in System Verification
ion. Production use of text-based methodology has enabled designers to capture designs of hundreds of thousands of gates using graphic ESDA tools. Source: Data Quest (Verilog/VHDL ...
Sanjay Sawant, Paul Giordano
SACRYPT
1999
Springer
13 years 10 months ago
Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator
We describe the design of Yarrow, a family of cryptographic pseudo-random number generators (PRNG). We describe the concept of a PRNG as a separate cryptographic primitive, and the...
John Kelsey, Bruce Schneier, Niels Ferguson
BCSHCI
2008
13 years 7 months ago
Experiences in designing personal health assistants for the impending aged generation
Our work aims to address the problems of designing health assistant applications that run on mobile devices. We discuss the lessons learnt through the design of a mobile applicati...
Dina Ahmad, Andreas Komninos, Lynne Baillie
CN
2006
174views more  CN 2006»
13 years 6 months ago
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey
Today's wireless networks are characterized by a fixed spectrum assignment policy. However, a large portion of the assigned spectrum is used sporadically and geographical var...
Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Sh...