Sciweavers

6770 search results - page 1000 / 1354
» How GPUs Work
Sort
View
145
Voted
MOBIHOC
2010
ACM
15 years 2 months ago
Greedy geographic routing in large-scale sensor networks: a minimum network decomposition approach
In geographic (or geometric) routing, messages are expected to route in a greedy manner: the current node always forwards a message to its neighbor node that is closest to the des...
Anne-Marie Kermarrec, Guang Tan
NOCS
2010
IEEE
15 years 2 months ago
Physical vs. Virtual Express Topologies with Low-Swing Links for Future Many-Core NoCs
The number of cores present on-chip is increasing rapidly. The on-chip network that connects these cores needs to scale efficiently. The topology of on-chip networks is an importan...
Chia-Hsin Owen Chen, Niket Agarwal, Tushar Krishna...
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
15 years 2 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
149
Voted
PIMRC
2010
IEEE
15 years 2 months ago
Energy, latency and capacity trade-offs in wireless multi-hop networks
This paper concentrates on characterizing energy, latency and capacity trade-offs in multi-hop wireless ad-hoc networks. Therefore, a multiobjective framework is proposed to derive...
Jean-Marie Gorce, Ruifeng Zhang, Katia Jaffr&egrav...
171
Voted
SECON
2010
IEEE
15 years 2 months ago
A Two-Tier Market for Decentralized Dynamic Spectrum Access in Cognitive Radio Networks
Market mechanisms have been exploited as important means for spectrum acquisition and access in cognitive radio networks. In this paper, we propose a two-tier market for decentrali...
Dan Xu, Xin Liu, Zhu Han
« Prev « First page 1000 / 1354 Last » Next »