Sciweavers

272 search results - page 13 / 55
» Exploring the acceptability envelope
Sort
View
MOBICOM
2012
ACM
13 years 1 days ago
Energy-based rate adaptation for 802.11n
Rate adaptation (RA) has been used to achieve high goodput. In this work, we explore to use RA for energy efficiency in 802.11n NICs. We show that current MIMO RA algorithms are ...
Chi-Yu Li, Chunyi Peng, Songwu Lu, Xinbing Wang
88
Voted
HPCA
2008
IEEE
15 years 10 months ago
Performance and power optimization through data compression in Network-on-Chip architectures
The trend towards integrating multiple cores on the same die has accentuated the need for larger on-chip caches. Such large caches are constructed as a multitude of smaller cache ...
Reetuparna Das, Asit K. Mishra, Chrysostomos Nicop...
TACAS
2005
Springer
88views Algorithms» more  TACAS 2005»
15 years 3 months ago
Shortest Counterexamples for Symbolic Model Checking of LTL with Past
Shorter counterexamples are typically easier to understand. The length of a counterexample, as reported by a model checker, depends on both the algorithm used for state space explo...
Viktor Schuppan, Armin Biere
JSA
2007
139views more  JSA 2007»
14 years 9 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
FOCI
2007
IEEE
15 years 3 months ago
The Immune System in Pieces: Computational Lessons from Degeneracy in the Immune System
— The concept of degeneracy in biology, including the immune system, is well accepted and has been demonstrated to be present at many different levels. We explore this concept fr...
Miguel Mendao, Jonathan Timmis, Paul S. Andrews, M...