Sciweavers

11217 search results - page 2094 / 2244
» Network Coding for Wireless Networks
Sort
View
PKC
2009
Springer
142views Cryptology» more  PKC 2009»
15 years 11 months ago
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Brian J. Matt
VLSID
2001
IEEE
129views VLSI» more  VLSID 2001»
15 years 11 months ago
Power-aware Multimedia Systems using Run-time Prediction
The need for low-power multimedia processing is integral to portable and embedded devices such as cell phones, wireless terminals, multimedia handhelds and PDAs. The multimedia pr...
Pavan Kumar, Mani B. Srivastava
POPL
2005
ACM
15 years 10 months ago
Formal prototyping in early stages of protocol design
Network protocol design is usually an informal process where debugging is based on successive iterations of a prototype implementation. The feedback provided by a prototype can be...
Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr
ICCAD
2001
IEEE
127views Hardware» more  ICCAD 2001»
15 years 7 months ago
What is the Limit of Energy Saving by Dynamic Voltage Scaling?
Dynamic voltage scaling (DVS) is a technique that varies the supply voltage and clock frequency based on the computation load to provide desired performance with the minimal amoun...
Gang Qu
73
Voted
CHI
2010
ACM
15 years 5 months ago
Evaluation of progressive image loading schemes
Although network bandwidth has increased dramatically, high-resolution images often take several seconds to load, and considerably longer on mobile devices over wireless connectio...
Chris Harrison, Anind K. Dey, Scott E. Hudson
« Prev « First page 2094 / 2244 Last » Next »