Sciweavers

10950 search results - page 2051 / 2190
» Future wireless networks
Sort
View
TCS
2008
15 years 4 months ago
The Magnus-Derek game
We introduce a new combinatorial game between two players: Magnus and Derek. Initially, a token is placed at position 0 on a round table with n positions. In each round of the gam...
Zhivko Prodanov Nedev, S. Muthukrishnan
JSA
2007
139views more  JSA 2007»
15 years 4 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
250
Voted
VLSISP
2008
129views more  VLSISP 2008»
15 years 4 months ago
Architecture and Evaluation of an Asynchronous Array of Simple Processors
Abstract-- This paper presents the architecture of an Asynchronous Array of simple Processors (AsAP), and evaluates its key architectural features as well as its performance and en...
Zhiyi Yu, Michael J. Meeuwsen, Ryan W. Apperson, O...
CCR
2004
84views more  CCR 2004»
15 years 4 months ago
The state of the email address
Electronic mail is an unquestionably vital component of the Internet infrastructure. While the general perception of email is that it "just works," surprisingly little d...
Mike Afergan, Robert Beverly
CCR
2004
151views more  CCR 2004»
15 years 4 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
« Prev « First page 2051 / 2190 Last » Next »