Sciweavers

3955 search results - page 403 / 791
» Comparing the Power of Robots
Sort
View
159
Voted
IJNSEC
2007
110views more  IJNSEC 2007»
15 years 4 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
ICCAD
2008
IEEE
89views Hardware» more  ICCAD 2008»
16 years 1 months ago
Temperature aware task sequencing and voltage scaling
Abstract—On-chip power density and temperature are rising exponentially with decreasing feature sizes. This alarming trend calls for temperature management at every level of syst...
Ramkumar Jayaseelan, Tulika Mitra
153
Voted
FPGA
2009
ACM
183views FPGA» more  FPGA 2009»
15 years 11 months ago
A comparison of via-programmable gate array logic cell circuits
Via-programmable gate arrays (VPGAs) offer a middle ground between application specific integrated circuits and field programmable gate arrays in terms of flexibility, manufac...
Thomas C. P. Chau, Philip Heng Wai Leong, Sam M. H...
157
Voted
GLOBECOM
2008
IEEE
15 years 11 months ago
Location-Aware Cooperative Communications Utilizing Linear Network Coding
— Cooperative communication can be used to reduce the transmit power of distant mobile units, compared to conventional direct transmission, given the same quality-of-service. How...
Hung-Quoc Lai, Ahmed S. Ibrahim, K. J. Ray Liu
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 11 months ago
Computationally Efficient Optimal Discrete Bit Allocation for Medium and High Target Bit Rate DMT Transmissions
—A computationally efficient optimal discrete bit allocation algorithm is proposed for medium and high target bit rate discrete multitone (DMT) transmissions. Unlike conventional...
Li-ping Zhu, Xiaofeng Zhong, Yan Yao, Shi-wei Dong...