Sciweavers

1065 search results - page 209 / 213
» A Simulation Based Study of TLB Performance
Sort
View
ISPD
2007
ACM
151views Hardware» more  ISPD 2007»
13 years 9 months ago
Pattern sensitive placement for manufacturability
When VLSI technology scales toward 45nm, the lithography wavelength stays at 193nm. This large gap results in strong refractive effects in lithography. Consequently, it is a huge...
Shiyan Hu, Jiang Hu
ISCAPDCS
2001
13 years 9 months ago
Optimal Broadcasting in Injured Hypercubes Using Directed Safety Levels
Reliable communication in injured hypercubes with faulty links/nodes using directed safety levels is studied in this paper. In this approach, each node u in an n-dimensional hyper...
Jie Wu
JSAC
2008
151views more  JSAC 2008»
13 years 8 months ago
Joint Beamforming and Power Allocation for Multiple Access Channels in Cognitive Radio Networks
A cognitive radio (CR) network is often described as a secondary network operating in a frequency band originally licensed/allocated to a primary network consisting of one or multi...
Lan Zhang, Ying-Chang Liang, Yan Xin
JCS
2006
116views more  JCS 2006»
13 years 8 months ago
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
We present GKMPAN, an efficient and scalable group rekeying protocol for secure multicast in ad hoc networks. Our protocol exploits the property of ad hoc networks that each membe...
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jaj...
IJSN
2007
129views more  IJSN 2007»
13 years 8 months ago
Single packet IP traceback in AS-level partial deployment scenario
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Turgay Korkmaz, Chao Gong, Kamil Saraç, San...