Sciweavers

1462 search results - page 190 / 293
» The Abstract MAC Layer
Sort
View
124
Voted
TMM
2011
160views more  TMM 2011»
14 years 7 months ago
Routing-Aware Multiple Description Video Coding Over Mobile Ad-Hoc Networks
Abstract—Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. We propose a rout...
Yiting Liao, Jerry D. Gibson
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 4 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
ICC
2011
IEEE
225views Communications» more  ICC 2011»
14 years 12 days ago
Throughput-Optimal Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
Abstract—We study a cooperative communication system consisting of two users in half duplex mode communicating with one destination over additive white Gaussian noise (AWGN). Coo...
Ahmad Abu Al Haija, Mai Vu
96
Voted
MICRO
2002
IEEE
127views Hardware» more  MICRO 2002»
15 years 5 months ago
DELI: a new run-time control point
The Dynamic Execution Layer Interface (DELI) offers the following unique capability: it provides fine-grain control over the execution of programs, by allowing its clients to obse...
Giuseppe Desoli, Nikolay Mateev, Evelyn Duesterwal...
ASPLOS
2008
ACM
15 years 2 months ago
Understanding and visualizing full systems with data flow tomography
It is not uncommon for modern systems to be composed of a variety of interacting services, running across multiple machines in such a way that most developers do not really unders...
Shashidhar Mysore, Bita Mazloom, Banit Agrawal, Ti...