Sciweavers

4266 search results - page 180 / 854
» The container loading problem
Sort
View
APNOMS
2006
Springer
15 years 7 months ago
Zone-Based Clustering for Intrusion Detection Architecture in Ad-Hoc Networks
Setting up an IDS architecture on ad-hoc network is hard because it is not easy to find suitable locations to setup IDS's. One way is to divide the network into a set of clust...
Il-Yong Kim, Yoo-Sung Kim, Ki-Chang Kim
CHES
2006
Springer
152views Cryptology» more  CHES 2006»
15 years 7 months ago
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style
In recent years, some countermeasures against Differential Power Analysis (DPA) at the logic level have been proposed. At CHES 2005 conference, Popp and Mangard proposed a new coun...
Daisuke Suzuki, Minoru Saeki
EUROPAR
2006
Springer
15 years 7 months ago
DOH: A Content Delivery Peer-to-Peer Network
Many SMEs and non-profit organizations suffer when their Web servers become unavailable due to flash crowd effects when their web site becomes popular. One of the solutions to the ...
Jimmy Jernberg, Vladimir Vlassov, Ali Ghodsi, Seif...
CHI
2005
ACM
15 years 6 months ago
A closed-loop tactor frequency control system for vibrotactile feedback
In this paper, we address the problem of maintaining a precise frequency in vibrating motors for use as vibrotactile cueing devices. Our solution utilizes a piezoelectric film sen...
Justin Cohen, Masataka Niwa, Robert W. Lindeman, H...
NETWORKING
2010
15 years 5 months ago
Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding
Embedding of virtual network (VN) requests on top of a shared physical network poses an intriguing combination of theoretical and practical challenges. Two major problems with the ...
Nabeel Farooq Butt, N. M. Mosharaf Kabir Chowdhury...