Sciweavers

21 search results - page 4 / 5
» Dynamics and bifurcations of the adaptive exponential integr...
Sort
View
CONCUR
2008
Springer
13 years 8 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
GLOBECOM
2007
IEEE
14 years 17 days ago
The Impacts of Radio Channels and Node Mobility on Link Statistics in Mobile Ad Hoc Networks
Abstract— Understanding link statistics in mobile ad hoc networks (MANETs) is essential to design adaptive routing protocols and achieve desired network performance. While much a...
Ming Zhao 0001, Wenye Wang
CSE
2009
IEEE
13 years 9 months ago
Rotation Scheduling and Voltage Assignment to Minimize Energy for SoC
— Low energy consumption is a critical issue in embedded systems design. As the technology feature sizes of SoC (Systems on Chip) become smaller and smaller, the percentage of le...
Meikang Qiu, Laurence Tianruo Yang, Edwin Hsing-Me...
JCSC
2002
129views more  JCSC 2002»
13 years 5 months ago
Leakage Current Reduction in VLSI Systems
There is a growing need to analyze and optimize the stand-by component of power in digital circuits designed for portable and battery-powered applications. Since these circuits re...
David Blaauw, Steven M. Martin, Trevor N. Mudge, K...
BMCBI
2010
191views more  BMCBI 2010»
13 years 6 months ago
Colonyzer: automated quantification of micro-organism growth characteristics on solid agar
Background: High-throughput screens comparing growth rates of arrays of distinct micro-organism cultures on solid agar are useful, rapid methods of quantifying genetic interaction...
Conor Lawless, Darren J. Wilkinson, Alexander Youn...