This paper proposes a new server architecture EINIC (Enhanced Integrated NIC) for multi-core processors to tackle the mismatch between network speed and host computational capacit...
Guangdeng Liao, Laxmi N. Bhuyan, Danhua Guo, Steve...
— Previously we have shown that chaos can arise in networks of physically realistic neurons [1], [2]. Those networks contain a moderate to large number of units connected in a sp...
- An adaptive watermarking method based on the human visual system model and the fuzzy inference system in wavelet domain is proposed. Fuzzy logic is used for data fusion and build...
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is designed as an interoperable replacement for the relay selection and directory service of th...
Jon McLachlan, Andrew Tran, Nicholas Hopper, Yongd...