Sciweavers

1358 search results - page 132 / 272
» Communication Analysis for System-On-Chip Design
Sort
View
MMNS
2001
151views Multimedia» more  MMNS 2001»
13 years 11 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
DATE
2008
IEEE
163views Hardware» more  DATE 2008»
14 years 2 days ago
A Simulation Methodology for Worst-Case Response Time Estimation of Distributed Real-Time Systems
In this paper, we propose a simulation-based methodology for worst-case response time estimation of distributed realtime systems. Schedulability analysis produces pessimistic uppe...
Soheil Samii, Sergiu Rafiliu, Petru Eles, Zebo Pen...
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 3 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
GLOBECOM
2007
IEEE
14 years 4 months ago
Finite Rate Feedback for Spatially and Temporally Correlated MISO Channels in the Presence of Estimation Errors and Feedback Del
—In this paper, the problem of finite-rate feedback for spatially and temporally correlated Rayleigh fading Multiple Input Single Output (MISO) channels with estimation errors a...
Yogananda Isukapalli, Bhaskar D. Rao
ICRA
2006
IEEE
134views Robotics» more  ICRA 2006»
14 years 4 months ago
Validation and Explanation of Waterhammer-based Locomotion
ACT Search and rescue robots often use tethers to provide power and communication, but tethers get caught on debris and small robots have difficulty with the added drag of the tet...
Ross L. Feller, Douglas P. Perrin, Robert D. Howe