Sciweavers

3483 search results - page 578 / 697
» Forward
Sort
View
IACR
2011
223views more  IACR 2011»
13 years 9 months ago
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping
Abstract. We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1 jointly proposed by Gemalto and Sagem S´ec...
Jean-Sébastien Coron, Aline Gouget, Thomas ...
INFOCOM
2012
IEEE
13 years 6 days ago
Link correlation aware opportunistic routing
—By exploiting reception diversity of wireless network links, researchers have shown that opportunistic routing can improve network performance significantly over traditional ro...
Anas Basalamah, Song Min Kim, Shuo Guo, Tian He, Y...
ISCA
2012
IEEE
191views Hardware» more  ISCA 2012»
13 years 5 days ago
VRSync: Characterizing and eliminating synchronization-induced voltage emergencies in many-core processors
Power consumption is a primary concern for microprocessor designers. Lowering the supply voltage of processors is one of the most effective techniques for improving their energy e...
Timothy N. Miller, Renji Thomas, Xiang Pan, Radu T...
ACL
2012
13 years 5 days ago
WizIE: A Best Practices Guided Development Environment for Information Extraction
Information extraction (IE) is becoming a critical building block in many enterprise applications. In order to satisfy the increasing text analytics demands of enterprise applicat...
Yunyao Li, Laura Chiticariu, Huahai Yang, Frederic...
SASN
2004
ACM
15 years 3 months ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson