Sciweavers

404 search results - page 54 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
135
Voted
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 7 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
107
Voted
ISI
2005
Springer
15 years 9 months ago
Modeling and Multiway Analysis of Chatroom Tensors
This work identifies the limitations of n-way data analysis techniques in multidimensional stream data, such as Internet chatroom communications data, and establishes a link betwe...
Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. ...
117
Voted
SPEECH
2010
102views more  SPEECH 2010»
14 years 10 months ago
Non-native speech perception in adverse conditions: A review
If listening in adverse conditions is hard, then listening in a foreign language is doubly so: non-native listeners have to cope with both imperfect signals and imperfect knowledg...
Maria Luisa Garcia Lecumberri, Martin Cooke, Anne ...
126
Voted
ANCS
2008
ACM
15 years 5 months ago
Towards effective network algorithms on multi-core network processors
To build high-performance network devices with holistic security protection, a large number of algorithms have been proposed. However, multi-core implementation of the existing al...
Yaxuan Qi, Zongwei Zhou, Baohua Yang, Fei He, Yibo...
142
Voted
CCR
2006
96views more  CCR 2006»
15 years 3 months ago
XCP for shared-access multi-rate media
The eXplicit Control Protocol (XCP) was developed to overcome some of the limitations of TCP, such as low utilization in high bandwidth delay product networks, unstable throughput...
Filipe Abrantes, Manuel Ricardo