Sciweavers

974 search results - page 118 / 195
» Simulation blocks for TOSSIM-T2
Sort
View
IMA
2007
Springer
97views Cryptology» more  IMA 2007»
15 years 5 months ago
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
Non-linear cryptanalysis is a natural extension to Matsui’s linear cryptanalitic techniques in which linear approximations are replaced by nonlinear expressions. Non-linear appro...
Juan M. Estévez-Tapiador, John A. Clark, Ju...
IPPS
2006
IEEE
15 years 5 months ago
Exploiting processing locality through paging configurations in multitasked reconfigurable systems
FPGA chips in reconfigurable computer systems are used as malleable coprocessors where components of a hardware library of functions can be configured as needed. As the number of ...
T. Taher, Tarek A. El-Ghazawi
SENSYS
2006
ACM
15 years 5 months ago
Datalink streaming in wireless sensor networks
Datalink layer framing in wireless sensor networks usually faces a trade-off between large frame sizes for high channel bandwidth utilization and small frame sizes for effective e...
Raghu K. Ganti, Praveen Jayachandran, Haiyun Luo, ...
SAINT
2005
IEEE
15 years 5 months ago
On Scalable Modeling of TCP Congestion Control Mechanism for Large-Scale IP Networks
In this paper, we propose an analytic approach of modeling a closed-loop network with multiple feedback loops using fluid-flow approximation. Specifically, we model building bl...
Hiroyuki Ohsaki, Juñya Ujiie, Makoto Imase
SIGCOMM
2004
ACM
15 years 4 months ago
A scalable distributed information management system
We present a Scalable Distributed Information Management System (SDIMS) that aggregates information about large-scale networked systems and that can serve as a basic building bloc...
Praveen Yalagandula, Michael Dahlin