Sciweavers

476 search results - page 76 / 96
» iOPEN Network: Operation Mechanisms and Experimental Study
Sort
View
EDBTW
2010
Springer
15 years 7 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
IPCCC
2006
IEEE
15 years 6 months ago
OS-aware tuning: improving instruction cache energy efficiency on system workloads
Low power has been considered as an important issue in instruction cache (I-cache) designs. Several studies have shown that the I-cache can be tuned to reduce power. These techniq...
Tao Li, Lizy K. John
99
Voted
IMC
2010
ACM
14 years 10 months ago
Resolving IP aliases with prespecified timestamps
Operators and researchers want accurate router-level views of the Internet for purposes including troubleshooting and modeling. However, tools such as traceroute return IP address...
Justine Sherry, Ethan Katz-Bassett, Mary Pimenova,...
SASN
2003
ACM
15 years 5 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
91
Voted
ICRA
2007
IEEE
102views Robotics» more  ICRA 2007»
15 years 6 months ago
On the Force Capabilities of Centripetal Force-actuated Microrobotic Platforms
—This paper studies the capabilities of a microrobotic platform, driven by vibrating motors, to generate and impart micromanipulation forces of desired type and magnitude. First,...
P. Vartholomeos, Kostas Vlachos, Evangelos Papadop...