Sciweavers

537 search results - page 61 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
ISMVL
1997
IEEE
99views Hardware» more  ISMVL 1997»
15 years 2 months ago
Useful Application of CMOS Ternary Logic to the Realisation of Asynchronous Circuits
This paper shows how the application of a CMOS ternary logic is useful in the realisation of Delay Insensitive (01)asynchronous circuits. It is shown that fully DIasynchronous cir...
Riccardo Mariani, Roberto Roncella, Roberto Salett...
AINA
2009
IEEE
15 years 3 months ago
How Long is the Lifetime of a Wireless Sensor Network?
Wireless sensor networks (WSNs) are known to be highly energy-constrained and each network’s lifetime has a strong dependence on the nodes’ battery capacity. As such, the netw...
Nok Hang Mak, Winston Khoon Guan Seah
INFOCOM
2007
IEEE
15 years 4 months ago
Reliable Routing with QoS Guarantees for Multi-Domain IP/MPLS Networks
Abstract—We present a distributed routing algorithm for finding two disjoint (primary and backup) QoS paths that run across multiple domains. Our work is inspired by the recent ...
Alexander Sprintson, Marcelo Yannuzzi, Ariel Orda,...
ASE
2002
160views more  ASE 2002»
14 years 9 months ago
Proving Invariants of I/O Automata with TAME
This paper describes a specialized interface to PVS called TAME (Timed Automata Modeling Environment) which provides automated support for proving properties of I/O automata. A maj...
Myla Archer, Constance L. Heitmeyer, Elvinia Ricco...
ISVLSI
2007
IEEE
204views VLSI» more  ISVLSI 2007»
15 years 4 months ago
Designing Memory Subsystems Resilient to Process Variations
As technology scales, more sophisticated fabrication processes cause variations in many different parameters in the device. These variations could severely affect the performance ...
Mahmoud Ben Naser, Yao Guo, Csaba Andras Moritz