Sciweavers

8825 search results - page 1322 / 1765
» All for one or one for all
Sort
View
BROADNETS
2005
IEEE
15 years 7 months ago
Dual-link failure resiliency through backup link mutual exclusion
— Networks employ link protection to achieve fast recovery from link failures. While the first link failure can be protected using link protection, there are several alternative...
Amit Chandak, Srinivasan Ramasubramanian
IOLTS
2005
IEEE
125views Hardware» more  IOLTS 2005»
15 years 7 months ago
Design of a Self Checking Reed Solomon Encoder
— In this paper, an innovative self-checking Reed Solomon encoder architecture is described. The presented architecture exploits some properties of the arithmetic operations in G...
Gian-Carlo Cardarilli, Salvatore Pontarelli, Marco...
102
Voted
WCRE
2005
IEEE
15 years 7 months ago
When Functions Change Their Names: Automatic Detection of Origin Relationships
It is a common understanding that identifying the same entity such as module, file, and function between revisions is important for software evolution related analysis. Most softw...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
MOBICOM
2005
ACM
15 years 7 months ago
Abiding geocast: time--stable geocast for ad hoc networks
Abiding geocast is a time stable geocast delivered to all nodes that are inside a destination region within a certain period of time. Services like position–based advertising, p...
Christian Maihöfer, Tim Leinmüller, Elma...
133
Voted
SIGCOMM
2005
ACM
15 years 7 months ago
ExOR: opportunistic multi-hop routing for wireless networks
This paper describes ExOR, an integrated routing and MAC protocol that increases the throughput of large unicast transfers in multi-hop wireless networks. ExOR chooses each hop of...
Sanjit Biswas, Robert Morris
« Prev « First page 1322 / 1765 Last » Next »