Sciweavers

3257 search results - page 590 / 652
» networking 2004
Sort
View
EEE
2004
IEEE
15 years 1 months ago
A Methodology to Find Web Site Keywords
For many companies and/or institutions it is no longer sufficient to have a web site and high quality products or services. What in many cases makes the difference between success...
Juan D. Velásquez, Richard Weber, Hiroshi Y...
EUC
2004
Springer
15 years 1 months ago
An Improved Handoff Technique for a Seamless Multimedia Services
Servicing mobile hosts over the Internet has some problems including nodes' location, independent addressing, address conversion and packet forwarding as well as mobile host&#...
Seung-Won Lee, Hyeon-Ok Hong, Seong-Ho Park, Yong ...
96
Voted
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
15 years 1 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
FPL
2004
Springer
119views Hardware» more  FPL 2004»
15 years 1 months ago
Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is...
Sandeep S. Kumar, Christof Paar
FTDCS
2004
IEEE
15 years 1 months ago
An Architectural View of the Entities Required for Execution of Task in Pervasive Space
Aimed to provide computation ubiquitously, pervasive computing is perceived as a means to provide an user the transparency of anywhere, anyplace, anytime computing. Pervasive comp...
K. Kalapriya, S. K. Nandy, V. Satish, R. Uma Mahes...