Sciweavers

2104 search results - page 345 / 421
» Sorting with networks of data structures
Sort
View
HICSS
2010
IEEE
228views Biometrics» more  HICSS 2010»
15 years 11 months ago
How to Establish an Online Innovation Community? the Role of Users and Their Innovative Content
We studied the evolution of an online innovation community and users’ interaction behavior through social network analysis to explore how to build an innovation community and ge...
Julia Hautz, Katja Hutter, Johann Füller, Kur...
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 11 months ago
A high-level debug environment for communication-centric debug
—A large part of a modern SOC’s debug complexity resides in the interaction between the main system components. ion-level debug moves the abstraction level of the debug process...
Kees Goossens, Bart Vermeulen, Ashkan Beyranvand N...
INFOCOM
2007
IEEE
15 years 10 months ago
Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
Abstract— Priority queues are essential for various network processing applications, including per-flow queueing with Quality-of-Service (QoS) guarantees, management of large fa...
Hao Wang, Bill Lin
ASWEC
2006
IEEE
15 years 10 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
IEEEARES
2006
IEEE
15 years 10 months ago
Censorship-Resistant and Anonymous P2P Filesharing
We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Inst...
Regine Endsuleit, Thilo Mie