Sciweavers

8655 search results - page 1345 / 1731
» Challenges for Trusted Computing
Sort
View
IPTPS
2003
Springer
15 years 9 months ago
PeerNet: Pushing Peer-to-Peer Down the Stack
- An unwritten principle of the Internet Protocol is that the IP address of a node also serves as its identifier. We observe that many scalability problems result from this princi...
Jakob Eriksson, Michalis Faloutsos, Srikanth V. Kr...
ISCIS
2003
Springer
15 years 9 months ago
Design of a Log Server for Distributed and Large-Scale Server Environments
Collection, storage and analysis of multiple hosts’ audit trails in a distributed manner are known as a major requirement, as well as a major challenge for enterprise-scale compu...
Attila Özgit, Burak Dayioglu, Erhan Anuk, Ina...
142
Voted
DATE
2010
IEEE
178views Hardware» more  DATE 2010»
15 years 9 months ago
Circuit propagation delay estimation through multivariate regression-based modeling under spatio-temporal variability
—With every process generation, the problem of variability in physical parameters and environmental conditions poses a great challenge to the design of fast and reliable circuits...
Shrikanth Ganapathy, Ramon Canal, Antonio Gonz&aac...
135
Voted
IWCMC
2010
ACM
15 years 9 months ago
Dividing sensitive ranges based mobility prediction algorithm in wireless networks
As wireless networks have been widely deployed for public mobile services, predicting the location of a mobile user in wireless networks became an interesting and challenging prob...
Yuliang Tang, Der-Jiunn Deng, Yannan Yuan, Chun-Ch...
105
Voted
JCDL
2010
ACM
238views Education» more  JCDL 2010»
15 years 9 months ago
BinarizationShop: a user-assisted software suite for converting old documents to black-and-white
Converting a scanned document to a binary format (black and white) is a key step in the digitization process. While many existing binarization algorithms operate robustly for well...
Fanbo Deng, Zheng Wu, Zheng Lu, Michael S. Brown
« Prev « First page 1345 / 1731 Last » Next »