Sciweavers

CIT
2006
Springer
13 years 8 months ago
Design of Novel Reversible Carry Look-Ahead BCD Subtractor
IEEE 754r is the ongoing revision to the IEEE 754 floating point standard. A major enhancement to the standard is the addition of decimal format, thus the design of BCD arithmetic...
Himanshu Thapliyal, Sumedha K. Gupta
CIT
2006
Springer
13 years 8 months ago
Bridging the Gap Between Reality and Simulations: An Ethernet Case Study
Simulation is a widely used technique in networking research and a practice that has suffered loss of credibility in recent years due to doubts about its reliability. In this pape...
Punit Rathod, Srinath Perur, Raghuraman Rangarajan
CIT
2006
Springer
13 years 8 months ago
An Event Notification Service based on XML Messaging on Different Transport Technologies
With the size and increasing complexity of telecom networks, there is a need to interconnect management systems at different levels. This requires information flow across many app...
Ravinder Thirumala, N. Usha Rani, Timothy A. Gonsa...
CIT
2006
Springer
13 years 8 months ago
Intelligent Query Tree (IQT) Protocol to Improve RFID Tag Read Efficiency
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanism...
Naval Bhandari, Anirudha Sahoo, Sridhar Iyer
CIT
2006
Springer
13 years 8 months ago
A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs
Running real time applications over wireless LANs is becoming common place. These applications require QoS. But the most widely used wireless LAN, IEEE 802.11, does not have QoS s...
Mayank Mishra, Anirudha Sahoo
CIT
2006
Springer
13 years 8 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji
CIT
2006
Springer
13 years 8 months ago
Fuzzy data mining for customer loyalty analysis
One of the major conceptual analyses in analytical CRM is customer loyalty. Current methods use user defined and statistical methods for loyalty analysis. One of the major limitat...
Jay B. Simha, S. S. Iyengar
CIT
2006
Springer
13 years 8 months ago
A High Performance ASIC for Cellular Automata (CA) Applications
CA are useful tools in modeling and simulation. However, the more complex a CA is, the longer it takes to run in typical environments. A dedicated CA machine solves this problem by...
Cheryl A. Kincaid, Saraju P. Mohanty, Armin R. Mik...
CIT
2006
Springer
13 years 8 months ago
Voice Conversion by Prosody and Vocal Tract Modification
In this paper we proposed some flexible methods, which are useful in the process of voice conversion. The proposed methods modify the shape of the vocal tract system and the chara...
K. Sreenivasa Rao, B. Yegnanarayana
CIT
2006
Springer
13 years 8 months ago
QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks
The ease of deployment and the infrastructure less nature of Mobile Ad hoc Networks (MANETs) make them highly desirable for the present day multi media communications. Traditional ...
Vinod Kone, Sukumar Nandi