Sciweavers

1125 search results - page 109 / 225
» Dependability in Aggregation by Averaging
Sort
View
CSREASAM
2008
14 years 11 months ago
Password Entry Scheme Resistant to Eavesdropping
- We propose an authentication scheme resistant to eavesdropping attacks. Users select an alphanumeric password with a length of 9-15 symbols. They can use this password in the tra...
Bogdan Hoanca, Kenrick J. Mock
PEWASUN
2008
ACM
14 years 11 months ago
The impact of delayed topology information in proactive routing protocols for MANETS
In the design of many proactive routing protocols for MANETs, it is often assumed that topology information is disseminated instantly and error free. Exceptions include hazysighte...
Andres Medina, Stephan Bohacek
TRECVID
2008
14 years 11 months ago
IRIM at TRECVID 2008: High Level Feature Extraction
The IRIM group is a consortium of French teams working on Multimedia Indexing and Retrieval. This paper describes our participation to the TRECVID 2008 High Level Features detecti...
Hervé Glotin, Zhongqui Zhao, Stéphan...
CAINE
2003
14 years 11 months ago
An Issue Logic for Superscalar Microprocessors
In order to enhance the computer performance, nowadays microprocessors use Superscalar architecture. But the Superscalar architecture is unable to enhance the performance effectiv...
Feng-Jiann Shiao, Jong-Jiann Shieh
NETWORKING
2004
14 years 11 months ago
Performance of Wireless Ad Hoc Networks under Balanced Fairness
Balanced fairness is a new resource sharing concept recently introduced by Bonald and Prouti`ere. We extend the use of this notion to wireless networks where the link capacities at...
Aleksi Penttinen, Jorma T. Virtamo