Sciweavers

EUC
2006
Springer
15 years 7 months ago
Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB
- Modern portable or embedded systems support more and more complex applications. These applications make embedded devices require not only low powerconsumption, but also high comp...
Wann-Yun Shieh, Hsin-Dar Chen
EUC
2006
Springer
15 years 7 months ago
Security in P2P Networks: Survey and Research Directions
A fundamental feature of Peer-to-Peer (P2P) networks is the honest collaboration among an heterogeneous community of participants. After Napster success
Esther Palomar, Juan M. Estévez-Tapiador, J...
EUC
2006
Springer
15 years 7 months ago
UbiqStor: Server and Proxy for Remote Storage of Mobile Devices
Mobile devices have difficulty in sustaining various services as in a wired environment, due to the storage shortage of the mobile device. The research[8] which provides remote sto...
MinHwan Ok, Daegeun Kim, Myong-Soon Park
EUC
2006
Springer
15 years 7 months ago
Formulas and Protocols for Broadcasting in Mobile Ad Hoc Networks
An operation is called broadcasting if a node sends a packet to all other nodes in an ad hoc network. Broadcasting is an elementary operation to support many applications in ad hoc...
Chang Wu Yu, Cheng Yao Tseng
EUC
2006
Springer
15 years 7 months ago
A Scalable and Untraceable Authentication Protocol for RFID
RFID(Radio Frequency Identification) is recently becoming popular, promising and widespread. In contrast, RFID tags can bring about traceability that causes user privacy and reduce...
Youngjoon Seo, Hyunrok Lee, Kwangjo Kim