Sciweavers

2237 search results - page 359 / 448
» On the Security of Random Sources
Sort
View
CORR
2008
Springer
123views Education» more  CORR 2008»
14 years 10 months ago
Networks become navigable as nodes move and forget
Abstract. We propose a dynamic process for network evolution, aiming at explaining the emergence of the small world phenomenon, i.e., the statistical observation that any pair of i...
Augustin Chaintreau, Pierre Fraigniaud, Emmanuelle...
28
Voted
CORR
2010
Springer
34views Education» more  CORR 2010»
14 years 10 months ago
Statistical Modelling of ft to Process Parameters in 30 nm Gate Length Finfets
This paper investigates the effect of process variations on unity gain frequency (ft) in 30 nm gate length FinFET by performing extensive TCAD simulations. Six different geometric...
B. Lakshmi, R. Srinivasan
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 10 months ago
Optimal Packet Scheduling in an Energy Harvesting Communication System
We consider the optimal packet scheduling problem in a single-user energy harvesting wireless communication system. In this system, both the data packets and the harvested energy ...
Jing Yang, Sennur Ulukus
CN
2007
154views more  CN 2007»
14 years 10 months ago
Disjoint multipath routing using colored trees
— Multipath routing (MPR) is an effective strategy to achieve robustness, load balancing, congestion reduction, and increased throughput in computer networks. Disjoint multipath ...
Srinivasan Ramasubramanian, Harish Krishnamoorthy,...
JUCS
2008
120views more  JUCS 2008»
14 years 9 months ago
Publication Bias in the Computer Science Education Research Literature
Abstract: Publication bias is the tendency for investigations with primarily nonstatistically significant findings to be withheld from the research record. Because publication bias...
Justus J. Randolph, Roman Bednarik