Sciweavers

3154 search results - page 576 / 631
» Computing Closed Skycubes
Sort
View
116
Voted
FCCM
2006
IEEE
195views VLSI» more  FCCM 2006»
15 years 5 months ago
A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2)
This paper presents a hardware-optimized variant of the well-known Gaussian elimination over GF(2) and its highly efficient implementation. The proposed hardware architecture, we...
Andrey Bogdanov, M. C. Mertens
ICDM
2006
IEEE
102views Data Mining» more  ICDM 2006»
15 years 5 months ago
Who Thinks Who Knows Who? Socio-cognitive Analysis of Email Networks
Interpersonal interaction plays an important role in organizational dynamics, and understanding these interaction networks is a key issue for any organization, since these can be ...
Nishith Pathak, Sandeep Mane, Jaideep Srivastava
LCN
2006
IEEE
15 years 5 months ago
Analysis of Exponential Backoff with Multipacket Reception in Wireless Networks
A collision resolution scheme is essential to the performance of a random-access wireless network. Most schemes employ exponential backoff (EB) to adjust the transmission attempt ...
Peng Xuan Zheng, Ying Jun Zhang, Soung Chang Liew
LCN
2006
IEEE
15 years 5 months ago
Protecting Multicast Sessions in Wireless Mesh Networks
To support reliable multicast routing in wireless mesh networks, it is important to protect multicast sessions against link or node failures. The issue of protecting multicast ses...
Xin Zhao, Chun Tung Chou, Jun Guo, Sanjay Jha
94
Voted
TRIDENTCOM
2006
IEEE
15 years 5 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff