Design and implementation of a shared memory switch fabric
|
|
1391 - 08
|
|
Real-Time Attack Scenario Detection via Intrusion Detection Alert Correlation
|
|
1391 - 06
|
|
Efficient Low Power Packet Classification by Grouping TCAM Rules
|
|
1390 - 09
|
|
Enhanced lifetime maximization algorithm for wireless sensor network
|
|
1390 - 04
|
|
Next Hop Storage and Retrieval for Coded and Scalar IP Prefix Trees
|
|
1389 - 12
|
|
A Scalable and Efficient Key Establishment Protocol for Wireless Sensor Networks
|
|
1389 - 09
|
|
Application of Line Graph for Link Schedulingin Wireless Networks under M-hop Interfernce Model
|
|
1389 - 04
|
|
A New Key Estabilishment Protocol for Limited Resource Wireless Sensor Networks
|
|
1389 - 04
|
|
Low-Power State-Retention Dual Edge-Triggered Pulsed Latch
|
|
1389 - 02
|
|
A Hybrid Key Establishment Protocol for Large Scale Wireless Sensor Networks
|
|
1389 - 01
|
|
Soft error filtered and hardened latch
|
|
1388 - 07
|
|
Malware propagation in online social networks
|
|
1388 - 07
|
|
QoS Aware Distributed Matching Algorithm for Link Scheduling in Wireless Networks
|
|
1388 - 07
|
|
Limited Forwarding Capability in Wireless Networks with Relaying
|
|
1388 - 07
|
|
Low-Power Dual-Edge Triggered State Retention Scan Flip-Flop
|
|
1388 - 06
|
|
Social Networks XSS Worms
|
|
1388 - 06
|
|
HRSQM Heterogeneous Receivers Supporting QoS Multicast
|
|
1388 - 03
|
|
Scalar Prefix Search A New Route Lookup Algorithm for Next Generation Internet
|
|
1388 - 01
|
|
LVT-SCFQ A Modified Self Clocked Fair Queueing Algorithm for Broadband Networks
|
|
1387 - 09
|
|
Effects of Security Solutions on Worm Propagation
|
|
1387 - 06
|
|