Sciweavers

574 search results - page 56 / 115
» Message delay in MANET
Sort
View
FGCN
2007
IEEE
126views Communications» more  FGCN 2007»
15 years 4 months ago
Traffic Splitting with Network Calculus for Mesh Sensor Networks
In many applications of sensor networks, it is essential to ensure that messages are transmitted to their destinations as early as possible and the buffer size of each sensor node...
Huimin She, Zhonghai Lu, Axel Jantsch, Li-Rong Zhe...
CATA
2010
14 years 10 months ago
A Hardware Implementation of the Advanced Encryption Standard (AES) Algorithm using SystemVerilog
In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consum...
Bahram Hakhamaneshi, Behnam S. Arad
CORR
2010
Springer
125views Education» more  CORR 2010»
14 years 9 months ago
Delay-rate tradeoff for ergodic interference alignment in the Gaussian case
In interference alignment, users sharing a wireless channel are each able to achieve data rates of up to half of the non-interfering channel capacity, no matter the number of users...
Joseph C. Koo, William Wu, John T. Gill III
WMASH
2005
ACM
15 years 3 months ago
Measurements of SIP signaling over 802.11b links
The Session Initiation Protocol (SIP) is a popular application-level signaling protocol that is used for a wide variety of applications such as session control and mobility handli...
Cristian Hesselman, Henk Eertink, Ing Widya, Erik ...
TPHOL
2009
IEEE
15 years 4 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...