Sciweavers

859 search results - page 147 / 172
» The Changing Face of Cryptography
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
A real-time multicast routing scheme for multi-hop switched fieldbuses
—The rapid scaling up of Networked Control Systems (NCS) is forcing traditional single-hop shared medium industrial fieldbuses (a.k.a. fieldbuses) to evolve toward multi-hop sw...
Lixiong Chen, Xue Liu, Qixin Wang, Yufei Wang
80
Voted
ICC
2011
IEEE
253views Communications» more  ICC 2011»
13 years 9 months ago
Geo-Assisted Multicast Inter-Domain Routing (GMIDR) Protocol for MANETs
Abstract— Large military ad hoc networks are often characterized by the interconnection of heterogeneous domains. The same trend is emerging in civilian MANETs (e.g., search and ...
Konglin Zhu, Biao Zhou, Xiaoming Fu, Mario Gerla
CVPR
2012
IEEE
13 years 3 days ago
Active image clustering: Seeking constraints from humans to complement algorithms
We propose a method of clustering images that combines algorithmic and human input. An algorithm provides us with pairwise image similarities. We then actively obtain selected, mo...
Arijit Biswas, David W. Jacobs
80
Voted
ISCA
2012
IEEE
191views Hardware» more  ISCA 2012»
13 years 3 days ago
VRSync: Characterizing and eliminating synchronization-induced voltage emergencies in many-core processors
Power consumption is a primary concern for microprocessor designers. Lowering the supply voltage of processors is one of the most effective techniques for improving their energy e...
Timothy N. Miller, Renji Thomas, Xiang Pan, Radu T...
PET
2012
Springer
13 years 3 days ago
PRISM - Privacy-Preserving Search in MapReduce
We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves pr...
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva,...