Sciweavers

683 search results - page 122 / 137
» Driver Destination Models
Sort
View
TIT
2010
146views Education» more  TIT 2010»
14 years 4 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
75
Voted
ICNSC
2007
IEEE
15 years 4 months ago
Planning the Location of Intermodal Freight Hubs: an Agent Based Approach
—Intermodal freight transportation is defined as a system that carries freight from origin to destination by using two or more transportation modes. In this system, hubs are one ...
Koen H. van Dam, Zofia Verwater-Lukszo, Luis Ferre...
PADS
2005
ACM
15 years 3 months ago
Simulating Realistic Packet Routing without Routing Protocols
A fundamental requirement for any network simulation environment is the realistic forwarding of packets from a source to a destination in the simulated topology. The routing decis...
George F. Riley, Dheeraj Reddy
ISCA
1995
IEEE
93views Hardware» more  ISCA 1995»
15 years 1 months ago
Optimizing Memory System Performance for Communication in Parallel Computers
Communicationin aparallel systemfrequently involvesmoving data from the memory of one node to the memory of another; this is the standard communication model employedin message pa...
Thomas Stricker, Thomas R. Gross
DAC
2007
ACM
15 years 10 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...