Sciweavers

8259 search results - page 245 / 1652
» On Generalized Feistel Networks
Sort
View
89
Voted
IMC
2004
ACM
15 years 6 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
124
Voted
NPC
2004
Springer
15 years 6 months ago
The HKUST Frog Pond - A Case Study of Sensory Data Analysis
Many sensor network applications are data-centric, and data analysis plays an important role in these applications. However, it is a challenging task to find out what specific prob...
Wenwei Xue, Bingsheng He, Hejun Wu, Qiong Luo
105
Voted
ANCS
2007
ACM
15 years 4 months ago
Optimal packet scheduling in output-buffered optical switches with limited-range wavelength conversion
All-optical packet switching is a promising candidate for future high-speed switching. However, due to the absence of optical Random Access Memory, the traditional Virtual Output ...
Lin Liu, Yuanyuan Yang
83
Voted
CCS
2010
ACM
15 years 27 days ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper
239
Voted
GIS
2005
ACM
16 years 1 months ago
Spatial queries in sensor networks
Recent advances in low-power sensing devices coupled with the widespread availability of wireless ad-hoc networks have fueled the development of sensor networks. These are typical...
Amir Soheili, Vana Kalogeraki, Dimitrios Gunopulos