Sciweavers

2814 search results - page 315 / 563
» Multicriteria Network Design Using Evolutionary Algorithm
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 10 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
CASES
2004
ACM
15 years 7 months ago
Automatic data partitioning for the agere payload plus network processor
With the ever-increasing pervasiveness of the Internet and its stringent performance requirements, network system designers have begun utilizing specialized chips to increase the ...
Steve Carr, Philip H. Sweany
WS
2005
ACM
15 years 9 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
MOBICOM
2009
ACM
15 years 10 months ago
Challenge: ultra-low-power energy-harvesting active networked tags (EnHANTs)
This paper presents the design challenges posed by a new class of ultra-low-power devices referred to as Energy-Harvesting Active Networked Tags (EnHANTs). EnHANTs are small, fle...
Maria Gorlatova, Peter R. Kinget, Ioannis Kymissis...
AINA
2008
IEEE
15 years 10 months ago
An Analytical Study of Wireless Error Models for Bluetooth Networks
Data transmission over wireless networks is challenging due to the occurrence of burst errors, and packet loss caused by such errors seriously limits the maximum achievable throug...
Hao-Hsiang Hung, Ling-Jyh Chen