Sciweavers

15792 search results - page 3057 / 3159
» Computational Abstraction Steps
Sort
View
GLOBECOM
2009
IEEE
15 years 10 months ago
Peer-to-Peer Single Hop Distributed Hash Tables
Abstract—Efficiently locating information in large-scale distributed systems is a challenging problem to which Peer-to-Peer (P2P) Distributed Hash Tables (DHTs) can provide a hi...
Luiz Rodolpho Monnerat, Cláudio L. Amorim
RECONFIG
2009
IEEE
172views VLSI» more  RECONFIG 2009»
15 years 10 months ago
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow
Abstract—The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customar...
Shivam Bhasin, Jean-Luc Danger, Florent Flament, T...
RTSS
2009
IEEE
15 years 10 months ago
Multi-Channel Interference Measurement and Modeling in Low-Power Wireless Networks
Abstract—Multi-channel design has received significant attention for low-power wireless networks (LWNs), such as 802.15.4-based wireless sensor networks, due to its potential of...
Guoliang Xing, Mo Sha, Jun Huang, Gang Zhou, Xiaor...
129
Voted
RTSS
2009
IEEE
15 years 10 months ago
On the Scheduling of Mixed-Criticality Real-Time Task Sets
Abstract—The functional consolidation induced by the costreduction trends in embedded systems can force tasks of different criticality (e.g. ABS Brakes with DVD) to share a proce...
Dionisio de Niz, Karthik Lakshmanan, Ragunathan Ra...
150
Voted
ICNP
2009
IEEE
15 years 10 months ago
EMS: Encoded Multipath Streaming for Real-time Live Streaming Applications
Abstract—Multipath streaming protocols have recently attracted much attention because they provide an effective means to provide high-quality streaming over the Internet. However...
Alix L. H. Chow, Hao Yang, Cathy H. Xia, Minkyong ...
« Prev « First page 3057 / 3159 Last » Next »