Sciweavers

5866 search results - page 1111 / 1174
» Designing Accelerator-Based Distributed Systems for High Per...
Sort
View
TDSC
2011
14 years 5 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
TIP
2010
111views more  TIP 2010»
14 years 4 months ago
Green Noise Digital Halftoning With Multiscale Error Diffusion
Multiscale error diffusion (MED) is superior to conventional error diffusion algorithms as it can eliminate directional hysteresis completely and possesses a good blue noise chara...
Yik-Hing Fung, Yuk-Hee Chan
VLSI
2010
Springer
14 years 4 months ago
Spatial EM jamming: A countermeasure against EM Analysis?
Electro-Magnetic Analysis has been identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar mathematically speaking, Power or E...
Francois Poucheret, Lyonel Barthe, Pascal Benoit, ...
CORR
2011
Springer
177views Education» more  CORR 2011»
14 years 1 months ago
Downlink SDMA with Limited Feedback in Interference-Limited Wireless Networks
The tremendous capacity gains promised by space division multiple access (SDMA) depend critically on the accuracy of the transmit channel state information. In the broadcast chann...
Marios Kountouris, Jeffrey G. Andrews
MOBIHOC
2009
ACM
15 years 10 months ago
Aging rules: what does the past tell about the future in mobile ad-hoc networks?
The study in mobile ad-hoc networks (MANET) is facing challenges brought by recent discovery of non-exponential behavior of the inter-contact time distribution of mobile nodes. In...
Han Cai, Do Young Eun
« Prev « First page 1111 / 1174 Last » Next »