Sciweavers

5005 search results - page 910 / 1001
» The Design and Analysis of Parallel Algorithms
Sort
View
141
Voted
RTSS
2005
IEEE
15 years 9 months ago
Decentralized Utilization Control in Distributed Real-Time Systems
Many real-time systems must control their CPU utilizations in order to meet end-to-end deadlines and prevent overload. Utilization control is particularly challenging in distribut...
Xiaorui Wang, Dong Jia, Chenyang Lu, Xenofon D. Ko...
ANCS
2005
ACM
15 years 9 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
102
Voted
MM
2005
ACM
110views Multimedia» more  MM 2005»
15 years 9 months ago
Photo LOI: browsing multi-user photo collections
The number of digital photographs is growing beyond the abilities of individuals to easily manage and understand their own photo collections. Photo LOI (Level of Interest) is a te...
Rahul Nair, Nick Reid, Marc Davis
124
Voted
SENSYS
2005
ACM
15 years 9 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
WOWMOM
2005
ACM
127views Multimedia» more  WOWMOM 2005»
15 years 9 months ago
Game Theoretic Power Aware Wireless Data Access
Abstract—This paper examines the following wireless data access scenario: a number of clients are interested in a set of data items kept at the server. A client sends a query req...
Mark Kai Ho Yeung, Yu-Kwong Kwok