Sciweavers

11580 search results - page 2190 / 2316
» Communication vs. Computation
Sort
View
CN
2007
168views more  CN 2007»
14 years 10 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
ISCA
2008
IEEE
201views Hardware» more  ISCA 2008»
14 years 10 months ago
iDEAL: Inter-router Dual-Function Energy and Area-Efficient Links for Network-on-Chip (NoC) Architectures
Network-on-Chip (NoC) architectures have been adopted by a growing number of multi-core designs as a flexible and scalable solution to the increasing wire delay constraints in the...
Avinash Karanth Kodi, Ashwini Sarathy, Ahmed Louri
COMGEO
2007
ACM
14 years 10 months ago
Geometric spanners with applications in wireless networks
In this paper we investigate the relations between spanners, weak spanners, and power spanners in RD for any dimension D and apply our results to topology control in wireless netw...
Christian Schindelhauer, Klaus Volbert, Martin Zie...
JIPS
2008
127views more  JIPS 2008»
14 years 10 months ago
Comparative Study on the Educational Use of Home Robots for Children
: Human-Robot Interaction (HRI), based on already well-researched Human-Computer Interaction (HCI), has been under vigorous scrutiny since recent developments in robot technology. ...
Jeonghye Han, Miheon Jo, Vicki Jones, Jun H. Jo
JUCS
2008
156views more  JUCS 2008»
14 years 10 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
« Prev « First page 2190 / 2316 Last » Next »