Design and implementation of a shared memory switch fabric
|
|
Conference |
Real-Time Attack Scenario Detection via Intrusion Detection Alert Correlation
|
|
Conference |
Efficient Low Power Packet Classification by Grouping TCAM Rules
|
|
Conference |
Enhanced lifetime maximization algorithm for wireless sensor network
|
|
Conference |
Next Hop Storage and Retrieval for Coded and Scalar IP Prefix Trees
|
|
Conference |
A Scalable and Efficient Key Establishment Protocol for Wireless Sensor Networks
|
|
Conference |
Application of Line Graph for Link Schedulingin Wireless Networks under M-hop Interfernce Model
|
|
Conference |
A New Key Estabilishment Protocol for Limited Resource Wireless Sensor Networks
|
|
Conference |
Low-Power State-Retention Dual Edge-Triggered Pulsed Latch
|
|
Conference |
A Hybrid Key Establishment Protocol for Large Scale Wireless Sensor Networks
|
|
Conference |
Soft error filtered and hardened latch
|
|
Conference |
Malware propagation in online social networks
|
|
Conference |
QoS Aware Distributed Matching Algorithm for Link Scheduling in Wireless Networks
|
|
Conference |
Limited Forwarding Capability in Wireless Networks with Relaying
|
|
Conference |
Low-Power Dual-Edge Triggered State Retention Scan Flip-Flop
|
|
Conference |
Social Networks XSS Worms
|
|
Conference |
HRSQM Heterogeneous Receivers Supporting QoS Multicast
|
|
Conference |
Scalar Prefix Search A New Route Lookup Algorithm for Next Generation Internet
|
|
Conference |
LVT-SCFQ A Modified Self Clocked Fair Queueing Algorithm for Broadband Networks
|
|
Conference |
Effects of Security Solutions on Worm Propagation
|
|
Conference |