Sciweavers

2200 search results - page 266 / 440
» Hop Integrity in Computer Networks
Sort
View
138
Voted
LCN
2000
IEEE
15 years 8 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
147
Voted
ICIP
1998
IEEE
16 years 5 months ago
A Neural Network Approach for Reconstructing Surface Shape from Shading
In this work, a framework for the reconstruction of smooth surface shapes from shading images is presented. The method is based on using a backpropagationbased neural network for ...
Jezekiel Ben-Arie, Dibyendu Nandy
115
Voted
DAC
2007
ACM
16 years 4 months ago
Optimal Selection of Voltage Regulator Modules in a Power Delivery Network
High efficiency low voltage DC-DC conversion is a key enabler to the design of power-efficient integrated circuits. Typically a star configuration of the DC-DC converters, where o...
Behnam Amelifard, Massoud Pedram
141
Voted
ICRA
2007
IEEE
165views Robotics» more  ICRA 2007»
15 years 10 months ago
Adaptive Sampling for Estimating a Scalar Field using a Robotic Boat and a Sensor Network
Abstract— This paper introduces an adaptive sampling algorithm for a mobile sensor network to estimate a scalar field. The sensor network consists of static nodes and one mobile...
Bin Zhang, Gaurav S. Sukhatme
138
Voted
ISPA
2004
Springer
15 years 9 months ago
A Congestion-Aware Search Protocol for Unstructured Peer-to-Peer Networks
Peer-to-Peer (P2P) file sharing is the hottest, fastest growing application on the Internet. When designing Gnutella-like applications, the most important consideration is the sca...
Kin Wah Kwong, Danny H. K. Tsang