Sciweavers

2063 search results - page 356 / 413
» connection 2007
Sort
View
CEE
2007
110views more  CEE 2007»
15 years 17 days ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...
123
Voted
DAGSTUHL
2006
15 years 2 months ago
Hierarchies Relating Topology and Geometry
Cognitive Vision has to represent, reason and learn about objects in its environment it has to manipulate and react to. There are deformable objects like humans which cannot be des...
Walter G. Kropatsch, Yll Haxhimusa, Pascal Lienhar...
115
Voted
IC
2004
15 years 2 months ago
An Efficient TCP Buffer Tuning Technique Based on Packet Loss Ratio (TBT-PLR)
The existing TCP (Transmission Control Protocol) is known to be unsuitable for a network with the characteristics of high BDP (Bandwidth-Delay Product) because of the fixed small o...
Gi-chul Yoo, Eun-sook Sim, Dongkyun Kim, Taeyoung ...
CSREASAM
2006
15 years 2 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
BMCBI
2007
172views more  BMCBI 2007»
15 years 18 days ago
Bayesian approaches to reverse engineer cellular systems: a simulation study on nonlinear Gaussian networks
Background: Reverse engineering cellular networks is currently one of the most challenging problems in systems biology. Dynamic Bayesian networks (DBNs) seem to be particularly su...
Fulvia Ferrazzi, Paola Sebastiani, Marco Ramoni, R...