Sciweavers

8497 search results - page 177 / 1700
» Design for an Optimal Probe
Sort
View
CODES
2003
IEEE
15 years 6 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang
101
Voted
LISA
2001
15 years 2 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
128
Voted
GRAPHICSINTERFACE
1996
15 years 2 months ago
Visualizing Geometric Uncertainty of Surface Interpolants
Evaluating and comparing the quality of surface interpolants is an important problem in computer graphics, computer aided geometric design and scienti c visualization. We introduc...
Suresh K. Lodha, Robert E. Sheehan, Alex Pang, Cra...
100
Voted
CCR
2007
176views more  CCR 2007»
15 years 21 days ago
Enhanced wireless mesh networking for ns-2 simulator
The ns-2 simulator has limited support for simulating 802.11based wireless mesh networks. We have added the following new features at the MAC and PHY layer of ns-2: (i) cumulative...
Vivek Mhatre
GROUP
2010
ACM
14 years 10 months ago
A study of cultural effects on mobile-collocated group photo sharing
International and intercultural collaborations provide a unique opportunity to explore cultural differences in the usage and appropriation of a technology. Mobile photo capture an...
Nirmal J. Patel, James Clawson, Namwook Kang, Seun...