Sciweavers

4037 search results - page 243 / 808
» Routing without ordering
Sort
View
228
Voted
CORR
2011
Springer
536views Education» more  CORR 2011»
14 years 7 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
GLOBECOM
2009
IEEE
14 years 10 months ago
Constellation Precoded Beamforming
Abstract--We present and analyze the performance of constellation precoded beamforming. This multi-input multi-output transmission technique is based on the singular value decompos...
Hong Ju Park, Ender Ayanoglu
100
Voted
INDOCRYPT
2005
Springer
15 years 6 months ago
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
Prouff has introduced recently, at FSE 2005, the notion of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in ...
Claude Carlet
104
Voted
ICDM
2002
IEEE
178views Data Mining» more  ICDM 2002»
15 years 5 months ago
gSpan: Graph-Based Substructure Pattern Mining
We investigate new approaches for frequent graph-based pattern mining in graph datasets and propose a novel algorithm called gSpan (graph-based Substructure pattern mining), which...
Xifeng Yan, Jiawei Han
113
Voted
ISCA
1991
IEEE
110views Hardware» more  ISCA 1991»
15 years 4 months ago
Dynamic Base Register Caching: A Technique for Reducing Address Bus Width
When address reference streams exhibit high degrees of spatial and temporal locality, many of the higher order address lines carry redundant information. By caching the higher ord...
Matthew K. Farrens, Arvin Park