Sciweavers

2503 search results - page 361 / 501
» Building Computer Network Attacks
Sort
View
HOTI
2008
IEEE
15 years 8 months ago
Design Exploration of Optical Interconnection Networks for Chip Multiprocessors
The Network-on-Chip (NoC) paradigm has emerged as a promising solution for providing connectivity among the increasing number of cores that get integrated into both systems-onchip...
Michele Petracca, Benjamin G. Lee, Keren Bergman, ...
114
Voted
PERCOM
2006
ACM
16 years 1 months ago
Transmission control scheme for fast RFID object identification
There are a variety of approaches to improve the speed at which large RFID tag populations are being identified. In this paper, we present a transmission control strategy for a co...
Christian Floerkemeier
111
Voted
PERCOM
2005
ACM
16 years 1 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
ICARIS
2004
Springer
15 years 7 months ago
Towards a Conceptual Framework for Artificial Immune Systems
We propose that bio-inspired algorithms are best developed and analysed in the context of a multidisciplinary conceptual framework that provides for sophisticated biological models...
Susan Stepney, Robert E. Smith, Jonathan Timmis, A...
MOBISYS
2009
ACM
16 years 2 months ago
StarTrack: a framework for enabling track-based applications
Mobile devices are increasingly equipped with hardware and software services allowing them to determine their locations, but support for building location-aware applications remai...
Ganesh Ananthanarayanan, Maya Haridasan, Iqbal Moh...