Sciweavers

403 search results - page 21 / 81
» Bits through ARQs
Sort
View
ICASSP
2008
IEEE
14 years 1 months ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig
PPAM
2007
Springer
14 years 26 days ago
Enhancing Productivity in High Performance Computing through Systematic Conditioning
Abstract. In order to take full advantage of high-end computing platforms, scientific applications often require modifications to source codes, and to their build systems that ge...
Magdalena Slawiñska, Jaroslaw Slawinski, Va...
AP2PS
2009
IEEE
14 years 1 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...
PACS
2004
Springer
115views Hardware» more  PACS 2004»
14 years 3 days ago
Reducing Delay and Power Consumption of the Wakeup Logic Through Instruction Packing and Tag Memoization
Dynamic instruction scheduling logic is one of the most critical components of modern superscalar microprocessors, both from the delay and power dissipation standpoints. The delay ...
Joseph J. Sharkey, Dmitry Ponomarev, Kanad Ghose, ...
CPHYSICS
2006
119views more  CPHYSICS 2006»
13 years 6 months ago
GDF: A tool for function estimation through grammatical evolution
This article introduces a tool for data fitting that is based on genetic programming and especially on the grammatical evolution technique. The user needs to input a series of poi...
Ioannis G. Tsoulos, Dimitris Gavrilis, Evangelos D...