Sciweavers

3618 search results - page 523 / 724
» Additive functions for number systems in function fields
Sort
View
BROADNETS
2005
IEEE
15 years 10 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
155
Voted
ISWC
2005
IEEE
15 years 10 months ago
Exploring Interaction with a Simulated Wrist-Worn Projection Display
One of the major limitations of portable computing devices is the small size of their built-in displays. Fortunately, extremely small projection systems are being developed that c...
Gábor Blaskó, Steven Feiner, Franz C...
RTAS
2005
IEEE
15 years 10 months ago
VPN Gateways over Network Processors: Implementation and Evaluation
Networking applications, such as VPN and content filtering, demand extra computing power in order to meet the throughput requirement nowadays. In addition to pure ASIC solutions, ...
Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-C...
128
Voted
GECCO
2004
Springer
116views Optimization» more  GECCO 2004»
15 years 10 months ago
A Comment on Opt-AiNET: An Immune Network Algorithm for Optimisation
Verifying the published results of algorithms is part of the usual research process. This helps to both validate the existing literature, but also quite often allows for new insigh...
Jon Timmis, Camilla Edmonds
ICPADS
2002
IEEE
15 years 10 months ago
Evaluating and Improving Performance of Multimedia Applications on Simultaneous Multi-Threading
This paper presents the study and results of running several core multimedia applications on a simultaneous multithreading (SMT) architecture, including some detailed analysis ran...
Yen-Kuang Chen, Eric Debes, Rainer Lienhart, Matth...