Sciweavers

382 search results - page 66 / 77
» Using C in CS1: evaluating the Stanford experience
Sort
View
MSWIM
2009
ACM
15 years 4 months ago
How do wireless chains behave?: the impact of MAC interactions
In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in...
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
FPGA
2007
ACM
124views FPGA» more  FPGA 2007»
15 years 4 months ago
A practical FPGA-based framework for novel CMP research
Chip-multiprocessors are quickly gaining momentum in all segments of computing. However, the practical success of CMPs strongly depends on addressing the difficulty of multithread...
Sewook Wee, Jared Casper, Njuguna Njoroge, Yuriy T...
ACSAC
2005
IEEE
15 years 3 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
JCB
2007
144views more  JCB 2007»
14 years 9 months ago
Statistical Estimation of Statistical Mechanical Models: Helix-Coil Theory and Peptide Helicity Prediction
Analysis of biopolymer sequences and structures generally adopts one of two approaches: use of detailed biophysical theoretical models of the system with experimentally-determined...
Scott C. Schmidler, Joseph E. Lucas, Terrence G. O...
WISEC
2010
ACM
15 years 2 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt