Design and implementation of a shared memory switch fabric
|
1391 - 08 |
Real-Time Attack Scenario Detection via Intrusion Detection Alert Correlation
|
1391 - 06 |
Efficient Low Power Packet Classification by Grouping TCAM Rules
|
1390 - 09 |
Enhanced lifetime maximization algorithm for wireless sensor network
|
1390 - 04 |
Next Hop Storage and Retrieval for Coded and Scalar IP Prefix Trees
|
1389 - 12 |
A Scalable and Efficient Key Establishment Protocol for Wireless Sensor Networks
|
1389 - 09 |
Application of Line Graph for Link Schedulingin Wireless Networks under M-hop Interfernce Model
|
1389 - 04 |
A New Key Estabilishment Protocol for Limited Resource Wireless Sensor Networks
|
1389 - 04 |
Low-Power State-Retention Dual Edge-Triggered Pulsed Latch
|
1389 - 02 |
A Hybrid Key Establishment Protocol for Large Scale Wireless Sensor Networks
|
1389 - 01 |
Soft error filtered and hardened latch
|
1388 - 07 |
Malware propagation in online social networks
|
1388 - 07 |
QoS Aware Distributed Matching Algorithm for Link Scheduling in Wireless Networks
|
1388 - 07 |
Limited Forwarding Capability in Wireless Networks with Relaying
|
1388 - 07 |
Low-Power Dual-Edge Triggered State Retention Scan Flip-Flop
|
1388 - 06 |
Social Networks XSS Worms
|
1388 - 06 |
HRSQM Heterogeneous Receivers Supporting QoS Multicast
|
1388 - 03 |
Scalar Prefix Search A New Route Lookup Algorithm for Next Generation Internet
|
1388 - 01 |
LVT-SCFQ A Modified Self Clocked Fair Queueing Algorithm for Broadband Networks
|
1387 - 09 |
Effects of Security Solutions on Worm Propagation
|
1387 - 06 |