Sciweavers

143 search results - page 24 / 29
» Encryption overhead in embedded systems and sensor network n...
Sort
View
IPSN
2010
Springer
14 years 9 days ago
Adaptive IEEE 802.15.4 protocol for energy efficient, reliable and timely communications
The IEEE 802.15.4 standard for wireless sensor networks can support energy efficient, reliable, and timely packet transmission by tuning the medium access control parameters macMi...
Pan Gun Park, Carlo Fischione, Karl Henrik Johanss...
IPPS
2007
IEEE
14 years 4 months ago
The Next Generation Software Workshop - IPDPS'07
This workshop provides a forum for an overview, project presentations, and discussion of the research fostered and funded initially by the NSF Next Generation Software (NGS) Progr...
Frederica Darema
DMTCS
2010
146views Mathematics» more  DMTCS 2010»
13 years 7 months ago
Tight Bounds for Delay-Sensitive Aggregation
This paper studies the fundamental trade-off between communication cost and delay cost arising in various contexts such as control message aggregation or organization theory. An o...
Yvonne Anne Pignolet, Stefan Schmid, Roger Wattenh...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 7 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
TACAS
2012
Springer
288views Algorithms» more  TACAS 2012»
12 years 6 months ago
Reduction-Based Formal Analysis of BGP Instances
Today’s Internet interdomain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfigurations by individual autonomou...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...