Sciweavers

1808 search results - page 303 / 362
» Locality optimization in wireless applications
Sort
View
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
15 years 6 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...
128
Voted
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
15 years 6 months ago
A Dynamic Assignment Problem in a Mobile System with Limited Bandwidth
The assignment problem originally arising from parallel and distributed computing has been investigated intensively since the 70’s when Harold Stone proposed a method to solve i...
Yang Wang 0006, Thomas Kunz
88
Voted
DATE
2010
IEEE
166views Hardware» more  DATE 2010»
15 years 6 months ago
From transistors to MEMS: Throughput-aware power gating in CMOS circuits
—In this paper we study the effectiveness of two power gating methods – transistor switches and MEMS switches – in reducing the power consumption of a design with a certain t...
Michael B. Henry, Leyla Nazhandali
89
Voted
COLCOM
2009
IEEE
15 years 5 months ago
Unified analytical models for Location Management costs and optimum design of location areas
—Within collaborative computing, computer mediated communications are evolving rapidly thanks to the development of new technologies. The facilitation of awareness and discovery ...
Eladio Martin, Ling Liu, Matt Weber, Péter ...
114
Voted
ICOIN
2001
Springer
15 years 5 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae