Sciweavers

6300 search results - page 307 / 1260
» We have it easy, but do we have it right
Sort
View
109
Voted
AINTEC
2007
Springer
15 years 5 months ago
A Prototyping Environment for Wireless Multihop Networks
Relative to the impressive number of proposals addressing the multitude of challenges raised by IEEE 802.11-based wireless networks, few have known real implementation. In wireless...
Fehmi Ben Abdesslem, Luigi Iannone, Marcelo Dias d...
109
Voted
ANCS
2007
ACM
15 years 5 months ago
Optimization of pattern matching algorithm for memory based architecture
Due to the advantages of easy re-configurability and scalability, the memory-based string matching architecture is widely adopted by network intrusion detection systems (NIDS). In...
Cheng-Hung Lin, Yu-Tang Tai, Shih-Chieh Chang
CCGRID
2007
IEEE
15 years 5 months ago
Large Scale Deployment of Molecular Docking Application on Computational Grid infrastructures for Combating Malaria
Computational grids are solutions for several biological applications like virtual screening or molecular dynamics where large amounts of computing power and storage are required....
Vinod Kasam, Jean Salzemann, Nicolas Jacq, Astrid ...
105
Voted
CF
2007
ACM
15 years 5 months ago
Identifying potential parallelism via loop-centric profiling
The transition to multithreaded, multi-core designs places a greater responsibility on programmers and software for improving performance; thread-level parallelism (TLP) will be i...
Tipp Moseley, Daniel A. Connors, Dirk Grunwald, Ra...
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
15 years 5 months ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir