Sciweavers

6348 search results - page 1248 / 1270
» Extensible control architectures
Sort
View
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
14 years 19 days ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
14 years 19 days ago
Digital Documents and Media
People need to find, work with, and put together information. Diverse activities, such as scholarly research, comparison shopping, and entertainment involve collecting and connect...
Michael A. Shepherd
RTSS
2003
IEEE
14 years 18 days ago
Data Caches in Multitasking Hard Real-Time Systems
Data caches are essential in modern processors, bridging the widening gap between main memory and processor speeds. However, they yield very complex performance models, which make...
Xavier Vera, Björn Lisper, Jingling Xue
MOBICOM
2003
ACM
14 years 18 days ago
Minimum energy disjoint path routing in wireless ad-hoc networks
We develop algorithms for finding minimum energy disjoint paths in an all-wireless network, for both the node and linkdisjoint cases. Our major results include a novel polynomial...
Anand Srinivas, Eytan Modiano
MSWIM
2003
ACM
14 years 18 days ago
Markov-based modeling of wireless local area networks
Errors introduced by a wireless medium are more frequent and profound than contemporary wired media. Some of these errors, which are not corrected by the physical layer, result in...
Syed A. Khayam, Hayder Radha
« Prev « First page 1248 / 1270 Last » Next »