Sciweavers

828 search results - page 67 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
CCS
2001
ACM
15 years 7 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
MACOM
2010
14 years 10 months ago
On the Performance of Single LDGM Codes for Iterative Data Fusion over the Multiple Access Channel
One of the applications of wireless sensor networks currently undergoing active research focuses on the scenario where the information generated by a data source S is simultaneousl...
Javier Del Ser, Javier Garcia-Frias, Pedro M. Cres...
MICRO
1996
IEEE
173views Hardware» more  MICRO 1996»
15 years 7 months ago
Java Bytecode to Native Code Translation: The Caffeine Prototype and Preliminary Results
The Java bytecode language is emerging as a software distribution standard. With major vendors committed to porting the Java run-time environment to their platforms, programs in J...
Cheng-Hsueh A. Hsieh, John C. Gyllenhaal, Wen-mei ...
MICRO
2006
IEEE
102views Hardware» more  MICRO 2006»
15 years 9 months ago
Managing Distributed, Shared L2 Caches through OS-Level Page Allocation
This paper presents and studies a distributed L2 cache management approach through OS-level page allocation for future many-core processors. L2 cache management is a crucial multi...
Sangyeun Cho, Lei Jin
CORR
2011
Springer
151views Education» more  CORR 2011»
14 years 6 months ago
A Stochastic-Geometry Approach to Coverage in Cellular Networks with Multi-Cell Cooperation
—Multi-cell cooperation is a promising approach for mitigating inter-cell interference in dense cellular networks. Quantifying the performance of multi-cell cooperation is challe...
Kaibin Huang, Jeffrey G. Andrews