Sciweavers

6164 search results - page 1142 / 1233
» Environmental Sensor Networks
Sort
View
ESAS
2005
Springer
14 years 2 months ago
An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices
Abstract. One of the most frequent operations in modern cryptosystems is a multi-scalar multiplication with two scalars. Common methods to compute it are the Shamir method and the ...
Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi
KES
2005
Springer
14 years 2 months ago
Reconfigurable Power-Aware Scalable Booth Multiplier
Abstract. An energy-efficient power-aware design is highly desirable for digital signal processing functions that encounter a wide diversity of operating scenarios in battery-power...
Hanho Lee
LCTRTS
2005
Springer
14 years 2 months ago
Nonintrusive precision instrumentation of microcontroller software
Debugging, testing, and profiling microcontroller programs are notoriously difficult. The lack of supporting software such as an operating system, a narrow interface to the hard...
Ben Titzer, Jens Palsberg
MSN
2005
Springer
142views Sensor Networks» more  MSN 2005»
14 years 2 months ago
Efficient Multiplexing Protocol for Low Bit Rate Multi-point Video Conferencing
This paper discusses an efficient implementation of the multiplexing protocol H.223, which is an important part of 3G-324M protocol stack required for 3G mobile multimedia communic...
Haohuan Fu, Xiaowen Li, Ji Shen, Weijia Jia
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
14 years 2 months ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao
« Prev « First page 1142 / 1233 Last » Next »