Sciweavers

357 search results - page 69 / 72
» No new wires
Sort
View
142
Voted
SIGMETRICS
2010
ACM
233views Hardware» more  SIGMETRICS 2010»
15 years 5 months ago
Incentivizing peer-assisted services: a fluid shapley value approach
A new generation of content delivery networks for live streaming, video on demand, and software updates takes advantage of a peer-to-peer architecture to reduce their operating co...
Vishal Misra, Stratis Ioannidis, Augustin Chaintre...
IPPS
1999
IEEE
15 years 4 months ago
Hardwired-Clusters Partial-Crossbar: A Hierarchical Routing Architecture for Multi-FPGA Systems
Multi-FPGA systems (MFSs) are used as custom computing machines, logic emulators and rapid prototyping vehicles. A key aspect of these systems is their programmable routing archit...
Mohammed A. S. Khalid, Jonathan Rose
ACSC
2004
IEEE
15 years 4 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
150
Voted
3DPH
2009
207views Healthcare» more  3DPH 2009»
15 years 1 months ago
A 3D Human Brain Atlas
3D representations of human physiology provide interesting options in the field of education. Understanding the human brain seems to be much easier when the anatomical structure is...
Sebastian Thelen, Jörg Meyer, Achim Ebert, Ha...
IJNSEC
2006
134views more  IJNSEC 2006»
15 years 7 days ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu