Sciweavers

208 search results - page 41 / 42
» Analysis of TCP's computational energy cost for mobile compu...
Sort
View
PETRA
2009
ACM
13 years 12 months ago
Carbon nanotube coated high-throughput neurointerfaces in assistive environments
Loosing motor activity due to impaired or damaged nerves or muscles affects millions of people world-wide. The resulting lack of mobility and/or impaired communication bears enorm...
Mario I. Romero-Ortega, Ali Raza Butt, Samir M. Iq...
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 3 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
ACISP
2006
Springer
13 years 11 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
DAC
2007
ACM
14 years 6 months ago
Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors
Minimizing power consumption is vitally important in embedded system design; power consumption determines battery lifespan. Ultralow-power designs may even permit embedded systems...
Changyun Zhu, Zhenyu (Peter) Gu, Li Shang, Robert ...
ICML
1995
IEEE
14 years 6 months ago
Learning to Make Rent-to-Buy Decisions with Systems Applications
In the single rent-to-buy decision problem, without a priori knowledge of the amount of time a resource will be used we need to decide when to buy the resource, given that we can ...
P. Krishnan, Philip M. Long, Jeffrey Scott Vitter