Sciweavers

ACSD
2006
IEEE
105views Hardware» more  ACSD 2006»
13 years 10 months ago
Throughput Analysis of Synchronous Data Flow Graphs
Synchronous Data Flow Graphs (SDFGs) are a useful tool for modeling and analyzing embedded data flow applications, both in a single processor and a multiprocessing context or for...
Amir Hossein Ghamarian, Marc Geilen, Sander Stuijk...
WISA
2007
Springer
13 years 10 months ago
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations
Abstract. The hash algorithm forms the basis of many popular cryptographic protocols and it is therefore important to find throughput optimal implementations. Though there have be...
Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede
IFIP
2007
Springer
13 years 10 months ago
Saturation Throughput Analysis of IEEE 802.11g (ERP-OFDM) Networks
This paper presents the saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks. The presented work is based on the Markov model previously introduced and validated by t...
Krzysztof Szczypiorski, Józef Lubacz
HIPEAC
2007
Springer
13 years 10 months ago
A Throughput-Driven Task Creation and Mapping for Network Processors
Abstract. Network processors are programmable devices that can process packets at a high speed. A network processor is typified by multithreading and heterogeneous multiprocessing...
Lixia Liu, Xiao-Feng Li, Michael K. Chen, Roy Dz-C...
COCOON
2007
Springer
13 years 10 months ago
Improved Throughput Bounds for Interference-Aware Routing in Wireless Networks
We propose new algorithms and improved bounds for interference-aware routing in wireless networks. First, we prove that n arbitrarily matched source-destinations pairs with average...
Chiranjeeb Buragohain, Subhash Suri, Csaba D. T&oa...
CHES
2007
Springer
154views Cryptology» more  CHES 2007»
13 years 10 months ago
Multi-gigabit GCM-AES Architecture Optimized for FPGAs
Abstract. This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high thro...
Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert ...
ATAL
2007
Springer
13 years 10 months ago
Robust coordination to sustain throughput of an unstable agent network
We present a multi-agent coordination technique to maintain throughput of a large-scale agent network system in the face of failures of agents. Failures do not just deteriorate th...
Rajesh Gautam, Kazuo Miyashita
NCA
2007
IEEE
13 years 10 months ago
Scheduling Bulk File Transfers with Start and End Times
The advancement of optical networking technologies has enabled e-science applications that often require transport of large volumes of scientific data. In support of such data-in...
Kannan Rajah, Sanjay Ranka, Ye Xia
INFOCOM
2007
IEEE
13 years 11 months ago
Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks
—802.11a, b, and g standards were designed for deployment in cooperative environments, and hence do not include mechanisms to protect from jamming attacks. In this paper, we expl...
Vishnu Navda, Aniruddha Bohra, Samrat Ganguly, Dan...
ICNP
2007
IEEE
13 years 11 months ago
Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach
Abstract— We address the problem of identifying high throughput paths in 802.11 wireless mesh networks. We introduce an analytical model that accurately captures the 802.11 MAC p...
Theodoros Salonidis, Michele Garetto, A. Saha, Edw...