Sciweavers

1045 search results - page 182 / 209
» Improving SHA-2 Hardware Implementations
Sort
View
118
Voted
WCNC
2010
IEEE
14 years 11 months ago
Localisation of Wireless LAN Nodes Using Accurate TDoA Measurements
—Time based localisation methods like GPS are widely used for outdoor navigation, whereas indoor navigation is typically performed only on a cell-basis or based on the Received S...
Reinhard Exel, Georg Gaderer, Patrick Loschmidt
107
Voted
WIAS
2010
102views more  WIAS 2010»
14 years 11 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
118
Voted
IPPS
2010
IEEE
14 years 10 months ago
Large neighborhood local search optimization on graphics processing units
Local search (LS) algorithms are among the most powerful techniques for solving computationally hard problems in combinatorial optimization. These algorithms could be viewed as &q...
Thé Van Luong, Nouredine Melab, El-Ghazali ...
ICC
2011
IEEE
217views Communications» more  ICC 2011»
14 years 3 days ago
Controlling LDPC Absorbing Sets via the Null Space of the Cycle Consistency Matrix
— This paper focuses on controlling absorbing sets for a class of regular LDPC codes, known as separable, circulantbased (SCB) codes. For a specified circulant matrix, SCB codes...
Jiadong Wang, Lara Dolecek, Richard D. Wesel
112
Voted
MOBISYS
2008
ACM
16 years 2 days ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...