Sciweavers

8080 search results - page 1494 / 1616
» From Computer Networks to Agent Networks
Sort
View
135
Voted
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
15 years 9 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
119
Voted
CIBCB
2005
IEEE
15 years 9 months ago
An Internet-based Melanoma Diagnostic System - Toward the Practical Application
— In this paper, we report a practical application of world’s first internet-based melanoma diagnostic system. The system is now available from all over the world, 24 hours 36...
Hitoshi Iyatomi, Hiroshi Oka, Masahiro Hashimoto, ...
150
Voted
HOTI
2005
IEEE
15 years 9 months ago
Hybrid Cache Architecture for High Speed Packet Processing
: The exposed memory hierarchies employed in many network processors (NPs) are expensive in terms of meeting the worst-case processing requirement. Moreover, it is difficult to ef...
Zhen Liu, Kai Zheng, Bin Liu
139
Voted
ICITA
2005
IEEE
15 years 9 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
145
Voted
ICMCS
2005
IEEE
94views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Video booklet
In this paper, we propose a novel system, Video Booklet, which enables efficient and nature video browsing and searching. In the system, a set of selected thumbnails excerpted fro...
Xian-Sheng Hua, Shipeng Li, Hong-Jiang Zhang
« Prev « First page 1494 / 1616 Last » Next »