Sciweavers

3563 search results - page 587 / 713
» Scheduling Algorithms for Procrastinators
Sort
View
153
Voted
ICNP
1998
IEEE
15 years 9 months ago
QGMA: A New MAC Protocol for Supporting QoS in Wireless Local Area Networks
In this paper, we propose a novel MAC protocol, called Quality-ofservice Guarantee Multiple Access (QGMA), in wireless local area networks to support the quality of service requir...
Yi Ye, Chao-Ju Hou, Ching-Chih Han
151
Voted
ASIACRYPT
1998
Springer
15 years 8 months ago
Analysis Methods for (Alleged) RC4
Abstract. The security of the alleged RC4 stream cipher and some variants is investigated. Cryptanalytic algorithms are developed for a known plaintext attack where only a small se...
Lars R. Knudsen, Willi Meier, Bart Preneel, Vincen...
ICCAD
1996
IEEE
85views Hardware» more  ICCAD 1996»
15 years 8 months ago
Exploiting regularity for low-power design
Abstract -- Current day behavioral-synthesis techniques produce architectures that are power-inefficient in the interconnect. Experiments have demonstrated that in synthesized desi...
Renu Mehra, Jan M. Rabaey
ICDT
1997
ACM
74views Database» more  ICDT 1997»
15 years 8 months ago
Serializability of Nested Transactions in Multidatabases
Abstract. The correctness of nested transactions for multidatabases differs from that of at transactions in that, for nested transactions the execution order of siblings at each re...
Ugur Halici, Ismailcem Budak Arpinar, Asuman Dogac
EURODAC
1994
IEEE
116views VHDL» more  EURODAC 1994»
15 years 8 months ago
A performance evaluator for parameterized ASIC architectures
System-levelpartitioning assigns functionalobjects such as tasks or code segments to system-level components such as o-the-shelf processors or application-speci c architectures in...
Jie Gong, Daniel D. Gajski, Alex Nicolau