Sciweavers

7504 search results - page 1202 / 1501
» Computing with Action Potentials
Sort
View
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
15 years 10 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...
COLCOM
2005
IEEE
15 years 10 months ago
Location assisted routing for near-far effect mitigation in wireless networks
CDMA technology represents an attractive choice for various wireless ad hoc networks applications, due to its appealing properties, such as resistance to jamming and interference,...
Hassan Mahmood, Cristina Comaniciu
ESCIENCE
2005
IEEE
15 years 10 months ago
A Peer-to-Peer Extension of Network-Enabled Server Systems
DIET (Distributed Interactive Engineering Toolbox) is a set of hierarchical components to design Network Enabled Server (NES) systems. In these systems, clients ask to agents (dis...
Eddy Caron, Frederic Desprez, Cédric Tedesc...
HICSS
2005
IEEE
146views Biometrics» more  HICSS 2005»
15 years 10 months ago
Open Source Enterprise Systems: Towards a Viable Alternative
Enterprise systems are located within the antinomy of appearing as generic product, while being means of multiple integrations for the user through configuration and customisation...
Alexander Dreiling, Helmut Klaus, Michael Rosemann...
ICDM
2005
IEEE
150views Data Mining» more  ICDM 2005»
15 years 10 months ago
Combining Multiple Clusterings by Soft Correspondence
Combining multiple clusterings arises in various important data mining scenarios. However, finding a consensus clustering from multiple clusterings is a challenging task because ...
Bo Long, Zhongfei (Mark) Zhang, Philip S. Yu
« Prev « First page 1202 / 1501 Last » Next »