Sciweavers

1722 search results - page 222 / 345
» Dedication
Sort
View
ATAL
2008
Springer
15 years 2 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...
134
Voted
ATAL
2008
Springer
15 years 2 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CHES
2008
Springer
151views Cryptology» more  CHES 2008»
15 years 2 months ago
Binary Edwards Curves
Abstract. This paper presents a new shape for ordinary elliptic curves over fields of characteristic 2. Using the new shape, this paper presents the first complete addition formula...
Daniel J. Bernstein, Tanja Lange, Reza Rezaeian Fa...
78
Voted
ASPDAC
2005
ACM
103views Hardware» more  ASPDAC 2005»
15 years 2 months ago
MAIA: a framework for networks on chip generation and verification
- The increasing complexity of SoCs makes networks on chip (NoC) a promising substitute for busses and dedicated wires interconnection schemes. However, new tools need to be develo...
Luciano Ost, Aline Mello, José Palma, Ferna...
CASES
2005
ACM
15 years 2 months ago
Automating custom-precision function evaluation for embedded processors
Due to resource and power constraints, embedded processors often cannot afford dedicated floating-point units. For instance, the IBM PowerPC processor embedded in Xilinx Virtex-...
Ray C. C. Cheung, Dong-U Lee, Oskar Mencer, Wayne ...