Sciweavers

10950 search results - page 2023 / 2190
» Future wireless networks
Sort
View
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
15 years 6 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood
WSNA
2003
ACM
15 years 6 months ago
Cleaning and querying noisy sensors
Sensor networks have become an important source of data with numerous applications in monitoring various real-life phenomena as well as industrial applications and traffic contro...
Eiman Elnahrawy, Badri Nath
88
Voted
NSDI
2010
15 years 2 months ago
EndRE: An End-System Redundancy Elimination Service for Enterprises
In many enterprises today, WAN optimizers are being deployed in order to eliminate redundancy in network traffic and reduce WAN access costs. In this paper, we present the design ...
Bhavish Agarwal, Aditya Akella, Ashok Anand, Athul...
111
Voted
SIGCOMM
2010
ACM
15 years 1 months ago
Mobile data offloading: how much can WiFi deliver?
This is a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited about 100 iPhone users from a metropolitan area and collected stat...
Kyunghan Lee, Injong Rhee, Joohyun Lee, Yung Yi, S...
118
Voted
DIALM
2003
ACM
139views Algorithms» more  DIALM 2003»
15 years 6 months ago
dBBlue: low diameter and self-routing bluetooth scatternet
This paper addresses the problem of scatternet formation for singlehop Bluetooth based ad hoc networks, with minimal communication overhead. We adopt the well-known structure de B...
Wen-Zhan Song, Xiang-Yang Li, Yu Wang 0003, Weizha...
« Prev « First page 2023 / 2190 Last » Next »