Sciweavers

3257 search results - page 590 / 652
» networking 2004
Sort
View
EEE
2004
IEEE
15 years 4 months ago
A Methodology to Find Web Site Keywords
For many companies and/or institutions it is no longer sufficient to have a web site and high quality products or services. What in many cases makes the difference between success...
Juan D. Velásquez, Richard Weber, Hiroshi Y...
102
Voted
EUC
2004
Springer
15 years 4 months ago
An Improved Handoff Technique for a Seamless Multimedia Services
Servicing mobile hosts over the Internet has some problems including nodes' location, independent addressing, address conversion and packet forwarding as well as mobile host&#...
Seung-Won Lee, Hyeon-Ok Hong, Seong-Ho Park, Yong ...
118
Voted
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
15 years 4 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
FPL
2004
Springer
119views Hardware» more  FPL 2004»
15 years 4 months ago
Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
Sandeep S. Kumar, Christof Paar
FTDCS
2004
IEEE
15 years 4 months ago
An Architectural View of the Entities Required for Execution of Task in Pervasive Space
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide an user the transparency of anywhere, anyplace, anytime computing. Pervasive comp...
K. Kalapriya, S. K. Nandy, V. Satish, R. Uma Mahes...