Sciweavers

1092 search results - page 17 / 219
» Located Operators
Sort
View
ARITH
2003
IEEE
14 years 3 months ago
On Computing Addition Related Arithmetic Operations via Controlled Transport of Charge
In this paper we investigate the implementation of basic arithmetic functions, such as addition and multiplication, in Single Electron Tunneling (SET) technology. First, we descri...
Sorin Cotofana, Casper Lageweg, Stamatis Vassiliad...
PERCOM
2005
ACM
14 years 9 months ago
Adaptive Location Management Scheme for Mobile IP
Mobile IP is a common standard to support global mobility of mobile hosts (MHs). One of the major problems for the Mobile IP is frequent location update and high signaling overhea...
Ha Won Kim, Sung Je Hong, Jong Kim
MSN
2007
Springer
110views Sensor Networks» more  MSN 2007»
14 years 4 months ago
A Location Aided Flooding Protocol for Wireless Ad Hoc Networks
Flooding in wireless ad hoc networks is a fundamental and critical operation in supporting various applications and protocols. However, the traditional flooding scheme generates ex...
Xinxin Liu, Xiaohua Jia, Hai Liu, Li Feng
SP
2006
IEEE
14 years 3 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
OPODIS
2004
13 years 11 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko