Sciweavers

1045 search results - page 182 / 209
» Improving SHA-2 Hardware Implementations
Sort
View
WCNC
2010
IEEE
13 years 5 months ago
Localisation of Wireless LAN Nodes Using Accurate TDoA Measurements
—Time based localisation methods like GPS are widely used for outdoor navigation, whereas indoor navigation is typically performed only on a cell-basis or based on the Received S...
Reinhard Exel, Georg Gaderer, Patrick Loschmidt
WIAS
2010
102views more  WIAS 2010»
13 years 5 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
IPPS
2010
IEEE
13 years 5 months ago
Large neighborhood local search optimization on graphics processing units
Local search (LS) algorithms are among the most powerful techniques for solving computationally hard problems in combinatorial optimization. These algorithms could be viewed as &q...
Thé Van Luong, Nouredine Melab, El-Ghazali ...
ICC
2011
IEEE
217views Communications» more  ICC 2011»
12 years 7 months ago
Controlling LDPC Absorbing Sets via the Null Space of the Cycle Consistency Matrix
— This paper focuses on controlling absorbing sets for a class of regular LDPC codes, known as separable, circulantbased (SCB) codes. For a specified circulant matrix, SCB codes...
Jiadong Wang, Lara Dolecek, Richard D. Wesel
MOBISYS
2008
ACM
14 years 7 months ago
Symphony: synchronous two-phase rate and power control in 802.11 wlans
Adaptive transmit power control in 802.11 Wireless LANs (WLANs) on a per-link basis helps increase network capacity and improves battery life of Wifi-enabled mobile devices. Howev...
Kishore Ramachandran, Ravi Kokku, Honghai Zhang, M...