Sciweavers

4809 search results - page 792 / 962
» CajunBot: Architecture and algorithms
Sort
View
JSAC
2007
157views more  JSAC 2007»
13 years 10 months ago
Network-aware P2P file sharing over the wireless mobile networks
— With the coming wireless mobile networks era and the popular use of P2P applications, how to improve the resource retrieval and discovery for P2P file sharing applications in ...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu
TVLSI
2008
121views more  TVLSI 2008»
13 years 10 months ago
Area-Efficient Arithmetic Expression Evaluation Using Deeply Pipelined Floating-Point Cores
Recently, it has become possible to implement floating-point cores on field-programmable gate arrays (FPGAs) to provide acceleration for the myriad applications that require high-p...
Ronald Scrofano, Ling Zhuo, Viktor K. Prasanna
CEE
2004
205views more  CEE 2004»
13 years 10 months ago
64-bit Block ciphers: hardware implementations and comparison analysis
A performance comparison for the 64-bit block cipher (Triple-DES, IDEA, CAST-128, MISTY1, and KHAZAD) FPGA hardware implementations is given in this paper. All these ciphers are u...
Paris Kitsos, Nicolas Sklavos, Michalis D. Galanis...
CN
2004
149views more  CN 2004»
13 years 10 months ago
Efficient dynamic traffic grooming in service-differentiated WDM mesh networks
In this paper, we address the issue of traffic grooming in arbitrary WDM mesh networks. We present a novel groomer architecture wherein a combination of grooming at two different ...
Harsha V. Madhyastha, C. Siva Ram Murthy
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
14 years 2 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni