Sciweavers

10952 search results - page 2186 / 2191
» Advances in Network Simulation
Sort
View
TMC
2010
158views more  TMC 2010»
14 years 8 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...
TOH
2010
97views more  TOH 2010»
14 years 8 months ago
A Frequency-Domain Analysis of Haptic Gratings
—The detectability and discriminability of virtual haptic gratings were analyzed in the frequency domain. Detection (Exp. 1) and discrimination (Exp. 2) thresholds for virtual ha...
Steven A. Cholewiak, Kwangtaek Kim, Hong Z. Tan, B...
IPPS
2010
IEEE
14 years 8 months ago
Scalable multi-pipeline architecture for high performance multi-pattern string matching
Multi-pattern string matching remains a major performance bottleneck in network intrusion detection and anti-virus systems for high-speed deep packet inspection (DPI). Although Aho...
Weirong Jiang, Yi-Hua Edward Yang, Viktor K. Prasa...
IPPS
2010
IEEE
14 years 8 months ago
On the importance of bandwidth control mechanisms for scheduling on large scale heterogeneous platforms
We study three scheduling problems (file redistribution, independent tasks scheduling and broadcasting) on large scale heterogeneous platforms under the Bounded Multi-port Model. I...
Olivier Beaumont, Hejer Rejeb
MICRO
2010
IEEE
142views Hardware» more  MICRO 2010»
14 years 8 months ago
Virtual Snooping: Filtering Snoops in Virtualized Multi-cores
Virtualization has been rapidly expanding its applications in numerous server and desktop environments to improve the utilization and manageability of physical systems. Such prolif...
Daehoon Kim, Hwanju Kim, Jaehyuk Huh
« Prev « First page 2186 / 2191 Last » Next »