Sciweavers

679 search results - page 104 / 136
» Algorithmic modifications to SPIHT
Sort
View
SAC
2003
ACM
15 years 8 months ago
Enabling Mobile Agents to Dynamically Assume Roles
Agent-based application development must face the issues related to the interactions among agents. In fact, their sociality allows decomposing large applications into collaboratin...
Giacomo Cabri, Luca Ferrari, Letizia Leonardi
SENSYS
2003
ACM
15 years 8 months ago
On the effect of localization errors on geographic face routing in sensor networks
In the absence of location errors, geographic routing - using a combination of greedy forwarding and face routing - has been shown to work correctly and efficiently. The effects o...
Karim Seada, Ahmed Helmy, Ramesh Govindan
EH
2002
IEEE
112views Hardware» more  EH 2002»
15 years 8 months ago
Evolving Circuits in Seconds: Experiments with a Stand-Alone Board-Level Evolvable System
The purpose of this paper is twofold: first, to illustrate a stand-alone board-level evolvable system (SABLES) and its performance, and second to illustrate some problems that occ...
Adrian Stoica, Ricardo Salem Zebulum, Michael I. F...
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 8 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
ISVLSI
2002
IEEE
104views VLSI» more  ISVLSI 2002»
15 years 8 months ago
Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation
Modular inverse computation is needed in several public key cryptographic applications. In this work, we present two VLSI hardware implementations used in the calculation of Montg...
Adnan Abdul-Aziz Gutub, Alexandre F. Tenca, &Ccedi...