Sciweavers

6300 search results - page 906 / 1260
» We have it easy, but do we have it right
Sort
View
ISCAS
2006
IEEE
81views Hardware» more  ISCAS 2006»
15 years 8 months ago
Equivalent output-filtering using fast QRD-RLS algorithm for burst-type training applications
— Fast QR decomposition RLS (FQRD-RLS) algorithms are well known for their good numerical properties and low computational complexity. The FQRD-RLS algorithms do not provide acce...
Mobien Shoaib, Stefan Werner, J. A. Apoliná...
IWPC
2006
IEEE
15 years 8 months ago
Evolution Storyboards: Visualization of Software Structure Dynamics
Large software systems have a rich development history. Mining certain aspects of this rich history can reveal interesting insights into the system and its structure. Previous app...
Dirk Beyer, Ahmed E. Hassan
SBACPAD
2006
IEEE
102views Hardware» more  SBACPAD 2006»
15 years 8 months ago
Ultra-Fast CPU Performance Prediction: Extending the Monte Carlo Approach
Performance evaluation of contemporary processors is becoming increasingly difficult due to the lack of proper frameworks. Traditionally, cycle-accurate simulators have been exte...
Ram Srinivasan, Jeanine Cook, Olaf M. Lubeck
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
15 years 8 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang
ADHOCNOW
2006
Springer
15 years 8 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong