Sciweavers

997 search results - page 94 / 200
» Power and Area Optimization for Multiple Restricted Multipli...
Sort
View
TSP
2010
14 years 4 months ago
Improving wireless physical layer security via cooperating relays
Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel c...
Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent...
FSE
2006
Springer
116views Cryptology» more  FSE 2006»
15 years 1 months ago
On Feistel Structures Using a Diffusion Switching Mechanism
We study a recently proposed design approach of Feistel structure which employs diffusion matrices in a switching way. At ASIACRYPT 2004, Shirai and Preneel have proved that large ...
Taizo Shirai, Kyoji Shibutani
GLOBECOM
2006
IEEE
15 years 4 months ago
Linear Coherent Decentralized Estimation
Abstract—We consider the distributed estimation of an unknown vector signal in a resource constrained sensor network with a fusion center. Due to power and bandwidth limitations,...
Jinjun Xiao, Shuguang Cui, Zhi-Quan Luo, Andrea J....
EC
2000
96views ECommerce» more  EC 2000»
14 years 9 months ago
Multiobjective Evolutionary Algorithms: Analyzing the State-of-the-Art
Solving optimization problems with multiple (often conflicting) objectives is, generally, a very difficult goal. Evolutionary algorithms (EAs) were initially extended and applied ...
David A. van Veldhuizen, Gary B. Lamont
VLSID
2006
IEEE
240views VLSI» more  VLSID 2006»
15 years 10 months ago
An Efficient and Accurate Logarithmic Multiplier Based on Operand Decomposition
Logarithmic Number Systems (LNS) offer a viable alternative in terms of area, delay and power to binary number systems for multiplication and division operations in signal process...
Venkataraman Mahalingam, N. Ranganathan