Sciweavers

411 search results - page 48 / 83
» Design of a Transmission Protocol for a CVE
Sort
View
ICPPW
2006
IEEE
14 years 2 months ago
Model Checking Control Communication of a FACTS Device
This paper concerns the design and verification of a realtime communication protocol for sensor data collection and processing between an embedded computer and a DSP. In such sys...
David A. Cape, Bruce M. McMillin, James K. Townsen...
FPL
2005
Springer
100views Hardware» more  FPL 2005»
14 years 2 months ago
HAIL: A Hardware-Accelerated Algorithm for Language Identification
A hardware-accelerated algorithm has been designed to automatically identify the primary languages used in documents transferred over the Internet. The algorithm has been implemen...
Charles M. Kastner, G. Adam Covington, Andrew A. L...
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
14 years 13 days ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
ICWN
2003
13 years 10 months ago
Eurecom IPv6 Soft Handover
The growing demand for high-speed wireless access to the Internet is the driving force behind the current trends to design All-IP wireless networks, whose Access Router and mobile ...
Farouk Belghoul, Yan Moret, Christian Bonnet
CORR
2007
Springer
154views Education» more  CORR 2007»
13 years 8 months ago
Distributed Space-Time Codes for Cooperative Networks with Partial CSI
— Design criteria and full-diversity Distributed Space Time Codes (DSTCs) for the two phase transmission based cooperative diversity protocol of Jing-Hassibi and the Generalized ...
G. Susinder Rajan, B. Sundar Rajan