Sciweavers

1462 search results - page 120 / 293
» The Abstract MAC Layer
Sort
View
135
Voted
ACSAC
2001
IEEE
15 years 8 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
DAC
2001
ACM
16 years 6 months ago
Addressing the System-on-a-Chip Interconnect Woes Through Communication-Based Design
Communication-based design represents a formal approach to systemon-a-chip design that considers communication between components as important as the computations they perform. Ou...
Marco Sgroi, Michael Sheets, Andrew Mihal, Kurt Ke...
128
Voted
DATE
2009
IEEE
136views Hardware» more  DATE 2009»
15 years 11 months ago
A file-system-aware FTL design for flash-memory storage systems
Abstract—As flash memory became popular over various platforms, there is a strong demand on the performance degradation problem, due to the special characteristics of flash mem...
Po-Liang Wu, Yuan-Hao Chang, Tei-Wei Kuo
DATE
2008
IEEE
167views Hardware» more  DATE 2008»
15 years 11 months ago
Accuracy-Adaptive Simulation of Transaction Level Models
Simulation of transaction level models (TLMs) is an established embedded systems design technique. Its use cases include virtual prototyping for early software development, platfo...
Martin Radetzki, Rauf Salimi Khaligh
144
Voted
WCNC
2008
IEEE
15 years 11 months ago
An Optimal Admission Control Policy for CDMA Multiple Antenna Systems with QoS Constraints
Abstract— An optimal admission control (AC) policy is proposed for a CDMA multiple antenna system, which can maximize the system throughput while simultaneously guaranteeing all ...
Wei Sheng, Steven D. Blostein