Sciweavers

2602 search results - page 7 / 521
» Semantic Analysis of 'to'
Sort
View
INFOCOM
2005
IEEE
15 years 5 months ago
On static reachability analysis of IP networks
The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provide...
Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Z...
82
Voted
IDEAS
2008
IEEE
114views Database» more  IDEAS 2008»
15 years 6 months ago
Incremental view-based analysis of stock market data streams
In this paper we show the usefulness and feasibility of applying conventional SQL queries for analyzing a wide spectrum of data streams. As application area we have chosen the ana...
Andreas Behrend, Christian Dorau, Rainer Manthey, ...
99
Voted
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
15 years 5 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...
86
Voted
ITEE
2007
15 years 1 months ago
Knowledge Acquisition and Risk Analysis in Material Recovery Facilities by a Virtual Team
1 A knowledge acquisition process that has been implemented by a virtual team for the development of a knowledge based early warning system in Material Recovery Facilities (MRFs) o...
Ioannis M. Dokas, Konstantinos Kitis, Christos Dod...
GLOBECOM
2006
IEEE
15 years 5 months ago
Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks
— Global flooding and expanding ring search are two commonly used methods in search for an interested object in multi-hop wireless networks. While global flooding is simple, it...
Kui Wu, Hong-Chuan Yang, Fulu Li