Sciweavers

947 search results - page 94 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
AH
2008
Springer
15 years 7 months ago
Accuracy in Rating and Recommending Item Features
This paper discusses accuracy in processing ratings of and recommendations for item features. Such processing facilitates featurebased user navigation in recommender system interfa...
Lloyd Rutledge, Natalia Stash, Yiwen Wang, Lora Ar...
INFOCOM
2006
IEEE
15 years 7 months ago
Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks
— As the use of sensor networks increases, security in this domain becomes a very real concern. One fundamental aspect of providing confidentiality and authentication is key dis...
Matthew J. Miller, Nitin H. Vaidya
TPDS
2008
231views more  TPDS 2008»
15 years 1 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
CASES
2010
ACM
14 years 11 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
TCAD
1998
114views more  TCAD 1998»
15 years 1 months ago
Behavioral optimization using the manipulation of timing constraints
— We introduce a transformation, named rephasing, that manipulates the timing parameters in control-data-flow graphs (CDFG’s) during the high-level synthesis of data-pathinten...
Miodrag Potkonjak, Mani B. Srivastava