Sciweavers

6800 search results - page 1236 / 1360
» On optimizing collective communication
Sort
View
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
14 years 3 days ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
ASAP
2006
IEEE
147views Hardware» more  ASAP 2006»
14 years 2 days ago
Reconfigurable Shuffle Network Design in LDPC Decoders
Several semi-parallel decoding architectures have been explored by researchers for the quasi-cyclic low density parity check (LDPC) codes. In these architectures, the reconfigurab...
Jun Tang, Tejas Bhatt, Vishwas Sundaramurthy
IWCMC
2010
ACM
14 years 2 days ago
Using connection expansion to reduce control traffic in MANETs
We consider the problem of control traffic overhead in MANETs with long-lived connections, operating under a reactive routing protocol (e.g. AODV). In such settings, control traff...
Zeki Bilgin, Bilal Khan, Ala I. Al-Fuqaha
CSCW
2008
ACM
13 years 12 months ago
Cutting into collaboration: understanding coordination in distributed and interdisciplinary medical research
Coordinating goals, schedules, and tasks among collaborators is difficult, and made even more so when there are disciplinary, geographic and institutional boundaries that must be ...
Saeko Nomura, Jeremy P. Birnholtz, Oya Rieger, Gil...
FITRAMEN
2008
13 years 11 months ago
A Fair and Dynamic Load-Balancing Mechanism
The current data network scenario makes Traffic Engineering (TE) a very challenging task. The ever growing access rates and new applications running on end-hosts result in more var...
Federico Larroca, Jean-Louis Rougier
« Prev « First page 1236 / 1360 Last » Next »