Sciweavers

403 search results - page 20 / 81
» Bits through ARQs
Sort
View
ACSAC
2003
IEEE
14 years 1 days ago
Practical Random Number Generation in Software
There is a large gap between the theory and practice for random number generation. For example, on most operating systems, using /dev/random to generate a 256-bit AES key is highl...
John Viega
ARITH
2003
IEEE
14 years 1 days ago
Revisiting SRT Quotient Digit Selection
The quotient digit selection in the SRT division algorithm is based on a few most significant bits of the remainder and divisor, where the remainder is usually represented in a r...
Peter Kornerup
ITIIS
2010
223views more  ITIIS 2010»
13 years 5 months ago
An Adaptive FEC Mechanism Using Cross-layer Approach to Enhance Quality of Video Transmission over 802.11 WLANs
Forward Error Correction (FEC) techniques have been adopted to overcome packet losses and to improve the quality of video delivery. The efficiency of the FEC has been significantl...
Longzhe Han, Sungjun Park, Seung-Seok Kang, Hoh Pe...
ICCD
2005
IEEE
134views Hardware» more  ICCD 2005»
14 years 3 months ago
Architectural Considerations for Energy Efficiency
The formal analysis of parallelism and pipelining is performed on an 8-bit Add-Compare-Select element of a Viterbi decoder. The results are quantified through a study of the delay...
Hoang Q. Dao, Bart R. Zeydel, Vojin G. Oklobdzija
CTRSA
2005
Springer
210views Cryptology» more  CTRSA 2005»
14 years 6 days ago
Hold Your Sessions: An Attack on Java Session-Id Generation
HTTP session-id’s take an important role in almost any web site today. This paper presents a cryptanalysis of Java Servlet 128-bit session-id’s and an efficient practical predi...
Zvi Gutterman, Dahlia Malkhi