A mobile hotspot in a vehicular environment consists of a group of end users that move as a whole in a public transit. This paper analyzes the performance of video service in mobile hotspots based on heterogeneous wireless technologies. The authors jointly consider the contention-based random access of the WLAN ...Download Now
The signature-based intrusion detection is one of the most commonly used techniques implemented in modern Intrusion Detection Systems (IDS). One of the powerful tools that gained wide acceptance in IDS signatures over the past several years is the regular expressions. How-ever, the performance requirements of traditional methods for matching the ...Download Now
In this paper, the authors present Odin II, a framework for Verilog Hardware Description Language (VHDL) synthesis that allows researchers to investigate approaches/improvements to different phases of HDL elaboration that have not been previously possible. Odin II's output can be fed into traditional back-end flows for both FPGAs and ASICs ...Download Now
For companies operating in an increasingly globalized business environment, e-business means online transactions, automated business collaborations and system integration. This means not only to provide products through supply chains, but also to delivery services and information through networks. The e-business tools and standards come from two domains known as Web ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?