Sciweavers

14898 search results - page 2941 / 2980
» Design of Neural Networks
Sort
View
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
15 years 8 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
GRID
2007
Springer
15 years 8 months ago
Global-scale peer-to-peer file services with DFS
The global inter-networking infrastructure that has become essential for contemporary day-to-day computing and communication tasks, has also enabled the deployment of several large...
Antony Chazapis, Georgios Tsoukalas, Georgios Veri...
EUROSYS
2009
ACM
15 years 8 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...
136
Voted
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 8 months ago
Adaptive Power Loading for OFDM-Based Cognitive Radio Systems
Abstract--Cognitive radio (CR) technology is an innovative radio design philosophy which aims to increase spectrum utilization by exploiting unused spectrum in dynamically changing...
Gaurav Bansal, Md. Jahangir Hossain, Vijay K. Bhar...
152
Voted
ICCCN
2007
IEEE
15 years 8 months ago
Applying Wavelet De-noising to Improve TCP Throughput in AQM queues with Existence of Unresponsive Traffic
Abstract-- in the current Internet, congestion control is performed jointly by the end systems running the TCP protocol and by routers running Active Queue Management (AQM) algorit...
Yi Pan, Wei K. Tsai, Tatsuya Suda
« Prev « First page 2941 / 2980 Last » Next »