Sciweavers

151 search results - page 19 / 31
» Appliance Displays: Accessibility Challenges and Proposed So...
Sort
View
97
Voted
BROADNETS
2007
IEEE
15 years 7 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
ICNP
2003
IEEE
15 years 6 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
ATS
2009
IEEE
127views Hardware» more  ATS 2009»
15 years 6 months ago
On the Generation of Functional Test Programs for the Cache Replacement Logic
Caches are crucial components in modern processors (both stand-alone or integrated into SoCs) and their test is a challenging task, especially when addressing complex and high-fre...
Wilson J. Perez, Danilo Ravotto, Edgar E. Sá...
83
Voted
ICDE
2010
IEEE
154views Database» more  ICDE 2010»
15 years 1 months ago
Processing online news streams for large-scale semantic analysis
— While Internet has enabled us to access a vast amount of online news articles originating from thousands of different sources, the human capability to read all these articles h...
Milos Krstajic, Florian Mansmann, Andreas Stoffel,...
JNW
2007
149views more  JNW 2007»
15 years 21 days ago
Adaptive Semantic Middleware for Mobile Environments
— Context-awareness is considered a key driving principle for the design and provisioning of adaptable pervasive services. Rightfully describing and interpreting context, however...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...