Sciweavers

4037 search results - page 519 / 808
» Routing without ordering
Sort
View
123
Voted
DATE
2008
IEEE
119views Hardware» more  DATE 2008»
15 years 11 months ago
Process Variation Aware Issue Queue Design
In sub-90nm process technology it becomes harder to control the fabrication process, which in turn causes variations between the design-time parameters and the fabricated paramete...
Raghavendra K, Madhu Mutyam
DSRT
2008
IEEE
15 years 11 months ago
Simulating the Potential Savings of Implicit Energy Management on a City Scale
According to statistics and future prospects in the next few years world-wide energy consumption will increase significantly. Therefore not only more energy efficient technologi...
Doris Zachhuber, Jakob Doppler, Alois Ferscha, Cor...
155
Voted
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
15 years 11 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
134
Voted
GLOBECOM
2008
IEEE
15 years 11 months ago
One- and Two-Way Decode-and-Forward Relaying for Wireless Multiuser MIMO Networks
— In this paper, we propose multiuser multiple-input multiple-ouput (MIMO) one- and two-way relaying protocols. Several wireless MIMO node pairs are establishing either unidirect...
Celal Esli, Armin Wittneben
103
Voted
ICASSP
2008
IEEE
15 years 11 months ago
Speech privacy for modern mobile communication systems
Speech privacy techniques are used to scramble clear speech into an unintelligible signal in order to avoid eavesdropping. Some analog speech-privacy equipments (scramblers) have ...
Jose Francisco de Andrade, Marcello Luiz Rodrigues...