Sciweavers

2799 search results - page 153 / 560
» computer 1998
Sort
View
88
Voted
STOC
1999
ACM
85views Algorithms» more  STOC 1999»
15 years 5 months ago
A Theorem on Sensitivity and Applications in Private Computation
In this paper we prove a theorem that gives an (almost) tight upper bound on the sensitivity of a multiple-output Boolean function in terms of the sensitivity of its coordinates an...
Anna Gál, Adi Rosén
113
Voted
INFOCOM
1998
IEEE
15 years 5 months ago
Loop-Free Multipath Routing Using Generalized Diffusing Computations
A new distributed algorithm for the dynamic computation of multiple loop-free paths from source to destination in a computer network or internet are presented,validated, and analy...
William T. Zaumen, J. J. Garcia-Luna-Aceves
146
Voted
IEEEARES
2006
IEEE
15 years 7 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
85
Voted
EUROMICRO
1998
IEEE
15 years 5 months ago
SMP PCs: A Case Study on Cluster Computing
As commodity microprocessors and networks reach performance levels comparable to those used in massively parallel processors, clusters of symmetric multiprocessors are starting to...
Antônio Augusto Fröhlich, Wolfgang Schr...
84
Voted
FCCM
1998
IEEE
111views VLSI» more  FCCM 1998»
15 years 5 months ago
A Stream-Based Configurable Computing Radio Testbed
Software radios have emerged as important tools in the development of new signal processing algorithms, networking protocols, and propagation experiments in wireless environments....
Steven Swanchara, Scott J. Harper, Peter M. Athana...