Sciweavers

3107 search results - page 51 / 622
» Error-Correcting Source Code
Sort
View
ISCA
2010
IEEE
199views Hardware» more  ISCA 2010»
13 years 11 months ago
Use ECP, not ECC, for hard failures in resistive memories
As leakage and other charge storage limitations begin to impair the scalability of DRAM, non-volatile resistive memories are being developed as a potential replacement. Unfortunat...
Stuart E. Schechter, Gabriel H. Loh, Karin Straus,...
ICCCN
2007
IEEE
14 years 2 months ago
Optimization Models for Streaming in Multihop Wireless Networks
— Wireless spectrum is a scare resource, while media streaming usually requires high end-to-end bandwidth. Media streaming in wireless ad hoc networks is therefore a particularly...
Zongpeng Li, Baochun Li, Mea Wang
INFOCOM
2002
IEEE
14 years 22 days ago
An Unequal Error Protection Method for Packet Loss Resilient 3-D Mesh Transmission
—In this paper, a packet-loss resilient, bandwidth-scalable 3-D graphics streaming system is proposed. It uses the Compressed Progressive Mesh (CPM) algorithm [1] to generate a h...
Ghassan Al-Regib, Yucel Altunbasak
NSDI
2010
13 years 9 months ago
Maranello: Practical Partial Packet Recovery for 802.11
Partial packet recovery protocols attempt to repair corrupted packets instead of retransmitting them in their entirety. Recent approaches have used physical layer confidence estim...
Bo Han, Aaron Schulman, Francesco Gringoli, Neil S...
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
12 years 7 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...