Sciweavers

11381 search results - page 2018 / 2277
» Connectivity
Sort
View
ECUMN
2007
Springer
15 years 11 months ago
Path Computation for Incoming Interface Multipath Routing
— Currently used IP routing protocols calculate and only use a single path between two nodes of a network, or in the best case, only paths with the same cost (with OSPF2 or IS-IS...
Pascal Mérindol, Jean-Jacques Pansiot, St&e...
ESA
2007
Springer
176views Algorithms» more  ESA 2007»
15 years 11 months ago
Arrangements in Geometry: Recent Advances and Challenges
We review recent progress in the study of arrangements in computational and combinatorial geometry, and discuss several open problems and areas for further research. In this talk I...
Micha Sharir
EUROCRYPT
2007
Springer
15 years 11 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
FPGA
2007
ACM
122views FPGA» more  FPGA 2007»
15 years 11 months ago
The shunt: an FPGA-based accelerator for network intrusion prevention
Today’s network intrusion prevention systems (IPSs) must perform increasingly sophisticated analysis—parsing protocols and interpreting application dialogs rather than simply ...
Nicholas Weaver, Vern Paxson, José M. Gonz&...
121
Voted
GI
2007
Springer
15 years 11 months ago
Potentials and Requirements of Mobile Ubiquitous Computing for Public Transport
: Public transport plays an important role in our society which is characterized by mobility, individuality, comfort and ecological constraints. It is common opinion that public tr...
Holger Mügge, Karl-Heinz Lüke, Matthias ...
« Prev « First page 2018 / 2277 Last » Next »