Sciweavers

872 search results - page 103 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
IJSNET
2010
143views more  IJSNET 2010»
13 years 6 months ago
Multi-radio medium access control protocol for wireless sensor networks
— In this paper, we propose a new dual radio medium access control (MAC) protocol for wireless sensor networks. Our MAC protocol design combines the advantages of low and high fr...
Junaid Ansari, Xi Zhang, Petri Mähönen
TVCG
2010
151views more  TVCG 2010»
13 years 2 months ago
Interactive Visual Analysis of Multiple Simulation Runs Using the Simulation Model View: Understanding and Tuning of an Electron
Multiple simulation runs using the same simulation model with different values of control parameters usually generate large data sets that capture the variational aspects of the be...
Kresimir Matkovic, Denis Gracanin, Mario Jelovic, ...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 11 months ago
Online Ciphers from Tweakable Blockciphers
Abstract. Online ciphers are deterministic length-preserving permutations EK : ({0, 1}n )+ → ({0, 1}n )+ where the i-th block of ciphertext depends only on the first i blocks of...
Phillip Rogaway, Haibin Zhang
MTV
2007
IEEE
121views Hardware» more  MTV 2007»
14 years 2 months ago
Chico: An On-chip Hardware Checker for Pipeline Control Logic
The widening gap between CPU complexity and verification capability is becoming increasingly more salient. It is impossible to completely verify the functionality of a modern mic...
Andrew DeOrio, Adam Bauserman, Valeria Bertacco
GLOBECOM
2006
IEEE
14 years 1 months ago
On the Suitability of Applications for GMPLS Networks
— After identifying that current GMPLS specifications only allow for the implementation of a call blocking mode of operation that handles immediate-request calls (not book-ahead...
Malathi Veeraraghavan, Xiuduan Fang, Xuan Zheng