Sciweavers

6770 search results - page 422 / 1354
» How GPUs Work
Sort
View
PERCOM
2007
ACM
16 years 4 months ago
Identity-Based Encryption for Sensor Networks
In spite of several years of intense research, the area of security and cryptography in Wireless Sensor Networks (WSNs) still has a number of open problems. On the other hand, the...
Leonardo B. Oliveira, Ricardo Dahab, Julio L&oacut...
PERCOM
2005
ACM
16 years 4 months ago
A Dynamic Lightweight Platform for Ad-Hoc Infrastructures
Mobile devices like PDAs or mobile phones have become widespread. Similarly, network functionality like GSM, Bluetooth, or WLAN has become standard. Nevertheless, not many applica...
Andreas Frei, Gustavo Alonso
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
16 years 2 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
ICWS
2009
IEEE
16 years 2 months ago
Flexible Probabilistic QoS Management of Transaction Based Web Services Orchestrations
—In this paper we extend our previous work on soft probabilistic contracts for QoS management, from the particular case of “response time”, to general QoS parameters. Our stu...
Sidney Rosario, Albert Benveniste, Claude Jard
ICCD
2008
IEEE
121views Hardware» more  ICCD 2008»
16 years 1 months ago
Characterization and design of sequential circuit elements to combat soft error
- This paper performs analysis and design of latches and flip-flops while considering the effect of event upsets caused by energetic particle hits. First it is shown that the conve...
Hamed Abrishami, Safar Hatami, Massoud Pedram