Sciweavers

5634 search results - page 1033 / 1127
» About Abstract Classes
Sort
View
RAID
2004
Springer
15 years 9 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
SAB
2004
Springer
198views Optimization» more  SAB 2004»
15 years 9 months ago
A Review of Probabilistic Macroscopic Models for Swarm Robotic Systems
Abstract. In this paper, we review methods used for macroscopic modeling and analyzing collective behavior of swarm robotic systems. Although the behavior of an individual robot in...
Kristina Lerman, Alcherio Martinoli, Aram Galstyan
UPP
2004
Springer
15 years 9 months ago
From Prescriptive Programming of Solid-State Devices to Orchestrated Self-organisation of Informed Matter
Abstract. Achieving real-time response to complex, ambiguous, highbandwidth data is impractical with conventional programming. Only the narrow class of compressible input-output ma...
Klaus-Peter Zauner
WISA
2004
Springer
15 years 9 months ago
Hyperelliptic Curve Coprocessors on a FPGA
Abstract. Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very interesting to investigate various implement...
Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil...
INFOCOM
2003
IEEE
15 years 9 months ago
Integration of 802.11 and Third-Generation Wireless Data Networks
Abstract— The third-generation (3G) wide area wireless networks and 802.11 local area wireless networks possess complementary characteristics. 3G networks promise to offer always...
Milind M. Buddhikot, Girish P. Chandranmenon, Seun...
« Prev « First page 1033 / 1127 Last » Next »