Sciweavers

441 search results - page 39 / 89
» A simple boiling module
Sort
View
INFOCOM
2006
IEEE
15 years 4 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
15 years 3 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
ECAL
2005
Springer
15 years 3 months ago
Co-evolution of Structures and Controllers for Neubot Underwater Modular Robots
Abstract. This article presents the first results of a project in underwater modular robotics, called Neubots. The goals of the projects are to explore, following Von Neumann’s ...
Barthélémy von Haller, Auke Jan Ijsp...
WAIM
2005
Springer
15 years 3 months ago
Extracting, Presenting and Browsing of Web Social Information
We address the problem that current Web applications present mainly the content-centric information, but lack cues and browsing mechanisms for online social information. After summ...
Yi Wang, Li-Zhu Zhou
DCC
2000
IEEE
15 years 2 months ago
Iterative Source/Channel-Decoding Using Reversible Variable Length Codes
In this paper we describe a trellis representation of variable length coded data which is capable of being used for bit-level or symbol-level maximum a posteriori (MAP) decoding o...
Rainer Bauer, Joachim Hagenauer