Sciweavers

4245 search results - page 848 / 849
» Delay Tolerant Networking
Sort
View
ICCAD
2010
IEEE
148views Hardware» more  ICCAD 2010»
13 years 8 months ago
Trace signal selection to enhance timing and logic visibility in post-silicon validation
Trace buffer technology allows tracking the values of a few number of state elements inside a chip within a desired time window, which is used to analyze logic errors during post-s...
Hamid Shojaei, Azadeh Davoodi
IMC
2010
ACM
13 years 8 months ago
Improving content delivery using provider-aided distance information
Content delivery systems constitute a major portion of today's Internet traffic. While they are a good source of revenue for Internet Service Providers (ISPs), the huge volum...
Ingmar Poese, Benjamin Frank, Bernhard Ager, Georg...
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 8 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
JSAC
2011
142views more  JSAC 2011»
13 years 5 months ago
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs
Abstract—In this paper, we propose a distributed key management framework based on group signature to provision privacy in vehicular ad hoc networks (VANETs). Distributed key man...
Yong Hao, Yu Cheng, Chi Zhou, Wei Song
TMC
2010
165views more  TMC 2010»
13 years 5 months ago
Energy-Efficient VoIP over Wireless LANs
Emerging dual-mode phones incorporate a Wireless LAN (WLAN) interface along with the traditional cellular interface. The additional benefits of the WLAN interface are, however, lik...
Vinod Namboodiri, Lixin Gao