Sciweavers

2262 search results - page 184 / 453
» Challenging Applications on Fast Networks
Sort
View
123
Voted
PERCOM
2005
ACM
16 years 4 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
ICISC
2004
169views Cryptology» more  ICISC 2004»
15 years 6 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
ICIP
2004
IEEE
16 years 6 months ago
Online face recognition system for videos based on modified probabilistic neural networks
Video retrieval in consumer applications demands high level semantic descriptors such as people's identity. The problem is that in a variety of videos such as home videos, Ho...
Jun Fan, Nevenka Dimitrova, Vasanth Philomin
MSWIM
2005
ACM
15 years 10 months ago
YAES: a modular simulator for mobile networks
Developing network protocols for mobile wireless systems is a complex task, and most of the existing simulator frameworks are not well suited for experimental development. The YAE...
Ladislau Bölöni, Damla Turgut
SC
2004
ACM
15 years 10 months ago
Collaborative User-Centric Lambda-Grid over Wavelength-Routed Network
Emerging lambda-Grid systems employ wavelength-routed network with optical switches to enable dynamic on-demand lightpaths with multi-gigabit rate bandwidth to interconnect shared...
Oliver T. Yu, Thomas A. DeFanti