Sciweavers

5922 search results - page 1067 / 1185
» Navigability of Complex Networks
Sort
View
SIGCOMM
2010
ACM
15 years 28 days ago
Achieving O(1) IP lookup on GPU-based software routers
IP address lookup is a challenging problem due to the increasing routing table size, and higher line rate. This paper investigates a new way to build an efficient IP lookup scheme...
Jin Zhao, Xinya Zhang, Xin Wang, Xiangyang Xue
111
Voted
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
15 years 27 days ago
Evaluating the Effect of Upgrade, Control and Development Strategies on Robustness and Failure Risk of the Power Transmission Gr
We use the OPA complex systems model of the power transmission system to investigate the effect of a series of different network upgrade scenarios on the long time dynamics and th...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
84
Voted
ADT
2010
15 years 26 days ago
An EAP-EHash authentication method adapted to resource constrained terminals
: In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Auth...
Omar Cheikhrouhou, Maryline Laurent, Amin Ben Abda...
ASC
2010
15 years 26 days ago
Simplifying Particle Swarm Optimization
The general purpose optimization method known as Particle Swarm Optimization (PSO) has received much attention in past years, with many attempts to find the variant that performs ...
M. E. H. Pedersen, Andrew J. Chipperfield
105
Voted
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 25 days ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
« Prev « First page 1067 / 1185 Last » Next »