Sciweavers

1098 search results - page 128 / 220
» InPhase: a communication system focused on
Sort
View
DATE
2010
IEEE
108views Hardware» more  DATE 2010»
13 years 5 months ago
Performance-asymmetry-aware topology virtualization for defect-tolerant NoC-based many-core processors
Topology virtualization techniques are proposed for NoCbased many-core processors with core-level redundancy to isolate hardware changes caused by on-chip defective cores. Prior w...
Lei Zhang 0008, Yue Yu, Jianbo Dong, Yinhe Han, Sh...
HOTNETS
2010
13 years 3 months ago
A case for information-bound referencing
Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol...
Ashok Anand, Aditya Akella, Vyas Sekar, Srinivasan...
JDCTA
2010
118views more  JDCTA 2010»
13 years 3 months ago
Shoppers' Experiences of Digital Signage-a Cross-National Qualitative Study
Digital signage, sometimes known as a Digital Communications Network (DCN) or private plasma screen network, has been little researched to date. This paper puts forward the view t...
Andrew Newman, Charles Dennis, Len-Tiu Wright, Tam...
TCOS
2010
13 years 3 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...
TON
2012
11 years 10 months ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu